Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Acrobat_DC_x64_VIP_v10.12.msi

Overview

General Information

Sample name:Acrobat_DC_x64_VIP_v10.12.msi
Analysis ID:1560658
MD5:b9632555b2c19b9182cab9c098c22d8e
SHA1:100d612540c51413141f52c3888114cddb76e9a0
SHA256:1164b944f47a9701ddd682f59c60425faed350647e3f9e562e1abc140a89c7f2
Infos:

Detection

BumbleBee
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
System process connects to network (likely due to code injection or exploit)
Yara detected BumbleBee
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to determine the online IP of the system
Searches for specific processes (likely to inject)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 7292 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Acrobat_DC_x64_VIP_v10.12.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7328 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • Reader_Install_Setup.exe (PID: 7400 cmdline: "C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe" MD5: E4E96D377207C990295577E0EBD93F79)
    • rundll32.exe (PID: 7408 cmdline: "rundll32.exe" "C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
BumbleBeeThis malware is delivered by an ISO file, with an DLL inside with a custom loader. Because of the unique user-agent "bumblebee" this malware was dubbed BUMBLEBEE. At the time of Analysis by Google's Threat Analysis Group (TAG) BumbleBee was observed to fetch Cobalt Strike Payloads.
  • EXOTIC LILY
  • GOLD CABIN
  • TA578
  • TA579
https://malpedia.caad.fkie.fraunhofer.de/details/win.bumblebee
{"C2 url": ["ejz7h2nwpe9p.live", "tok60x6gccij.live", "aummhmvbuvf7.live", "x5a5l51t3vh5.live", "y82gwd3wieon.live", "b8y5k2ri9mez.live", "cc3bxmp3p9ww.live", "zv119x3fg98y.live", "vrsi1nlyz8hp.live", "u8fbv3mj3v2o.live", "iri6971t7ge3.live", "9nrkgb5ymmhx.live", "72sisvsb57q6.live", "nlkef4koisho.live", "n1gd464fiz18.live", "qmgxpjkisusl.live", "vmh0ep7s9854.live", "vo3yj33yyalx.live", "541xdsl3qrmo.live", "h64g4n2r4pio.live", "bdleys30kkz3.live", "2e0ygf9sxa6j.live", "hlhhny6jyz0h.live", "w2pjbfv1lp0s.live", "ituux0ny27ur.live", "it44epclfvn0.live", "w84emvz3j8hk.live", "t6fln95iafzj.live", "jbo4jhymyavk.live", "y0rqp62hxwp0.live", "rzctrohkd26r.live", "q8txsh5ger29.live", "nmmbz5mvu9b6.live", "forned95q3gl.live", "nvzd7pgfgpxt.live", "y3md2wem8eab.live", "sztn5z9mczvv.live", "hfswfaj1th9o.live", "iaqxv2w3o0xc.live", "ugo1867z96wg.live", "sdj52uv9ye3b.live", "wrkxzshr4idg.live", "4xtvsj1w0qwx.live", "gn5827958xrg.live", "x1jlunfqrqtv.live", "hquppb63rgrg.live", "o91173l27glq.live", "3ysjrezb3os9.live", "5nhc44cf83r7.live", "utltlu232nmc.live", "px5wxjvm0958.live", "sip8h0d4tgrf.live", "3ofolpuywddt.live", "ig42hrwh0svv.live", "r4og0ibkr2i1.live", "s542jqly9hk1.live", "6yb78j9xx6kg.live", "67foms8ek35i.live", "a1xbi34msajq.live", "oltfqksrbe1h.live", "olka4w167pg5.live", "cq72kwl2pw8w.live", "em3wdkia152l.live", "4cxyghx0ba1x.live", "99onc4240lhw.live", "are8uz74o21e.live", "7u78fpro0nvy.live", "mak2p2u1p6oc.live", "3l6704byr3c4.live", "ijxbxsajcb1p.live", "qnlqvmlc95m4.live", "dkm740j7a284.live", "j40qreidx6y3.live", "we0f3yexor36.live", "dd5bzcuuvist.live", "eldzk3tkcta3.live", "a6rtdeit0sty.live", "hu3dj149h820.live", "77mk5fucuhe8.live", "437jwomut9vr.live", "eqg3217g92zf.live", "i22gcdhfevxk.live", "xxdueooznk6v.live", "tzcodnn2epik.live", "ejr4r59avayq.live", "0ws4d9s611dt.live", "frsgmv876w5a.live", "ntrzvqm429kj.live", "3l9jbihmbpmk.live", "cbugpmw95dcb.live", "miq50i5wpk85.live", "h8pwl3uhwlfn.live", "qj3zj9oywxx7.live", "zd6j8je6phb4.live", "t6ocigyxberq.live", "pdim2swkrf2v.live", "mppytmrfpgug.live", "i5ke68h24a00.live", "qxul3spnx991.live", "vzrt76g9gk0g.live", "yc6716yc7nf7.live", "87bnnasq71mu.live", "obmwpmuwhfu7.live", "0aw4a73tdsz1.live", "n6nzy4xlso4s.live", "syhmn2nbxrtr.live", "exiarctkfedq.live", "j5p6emlxlecl.live", "egdk83k09qmr.live", "0fhr0297aorb.live", "6z4lwstr3zxx.live", "lh37yjie545p.live", "lfi8tslls020.live", "ppgwgn0qtww4.live", "0k6o18rmf93s.live", "sucnfknz0x3m.live", "r33j2bx1ieh9.live", "rti8b3e5byh3.live", "uj8gs5xxvv4g.live", "y7bc5b0ezh5m.live", "vh378qqwk9vc.live", "uamdjqdesjmn.live", "rfzo8fwm7pdw.live", "9gle7ejwpees.live", "26wem2p2aunb.live", "2ujyrqt4xzmp.live", "kg6w8hdimtgi.live", "dggn2tge08jf.live", "lygtfikzieri.live", "h8laq4jtyfqp.live", "u6ye5aivfq8b.live", "nwd3emyfsyin.live", "z3atxb3cfji3.live", "w00hvclrjhb1.live", "6mca3un8fmrd.live", "xv8ev6g1h4g3.live", "k1q1fkrd37n3.live", "btf4j310getp.live", "4p06saxn3ubp.live", "5aphqp78vw8h.live", "3r045r8mjwfp.live", "kwekpaz4eobt.live", "0eiko3lmbxbj.live", "8vxea0tldluf.live", "y2ec6qvepl7y.live", "5xlu80qs1ox1.live", "n3om81law5m7.live", "ei2svhuxkfnm.live", "kdye9rtnqezb.live", "boxoxs9gx6f5.live", "ktzb5e49zz1m.live", "ymz7vmrsh6eu.live", "x7dnaw133jnh.live", "hupacwlnz805.live", "1tlgdsxl0pqt.live", "3z5rr2y27c6j.live", "ufiiux335dpw.live", "vu32g1q7jvl3.live", "fkvo7y76r6cl.live", "aa8btew33mma.live", "yfpmjc270ree.live", "jrn2pbs4zh17.live", "7hxcfu85ux0c.live", "xkctmynb51ur.live", "16fpr15y5e2s.live", "lxck7t4mnvah.live", "2thp12dgf6rb.live", "vzq8xfz91x5d.live", "a0xjyxk6h5m7.live", "l8is8ftcfws6.live", "qtwfxhporina.live", "6lgie8q5pjdc.live", "12hpr97amca3.live", "ya8ym63w9m91.live", "kiph911rpr6p.live", "vmduug7itjpc.live", "q7bu8jglm22a.live", "9rfwwr2pkx4u.live", "0xejepvnnpze.live", "fd7cxsr946wv.live", "nsqum7l04ak6.live", "28hnsvxigwgm.live", "rlezxvz505nn.live", "r8o1vudqot70.live", "5ax9d1kvmld4.live", "fum22rxxfolh.live", "w525f7mmd4ms.live", "19pubdw7x197.live", "23k1m1uhe7kg.live", "w3d73cw4ayun.live", "e8y8k4xhyx42.live", "lsogs7k1lsrr.live", "vxcd26ui2k5o.live", "vlqwx3ydmtxh.live", "0vyvyfx6ymxv.live", "mrwrxcp86n8e.live", "dxwhiektvxsc.live", "zaig1x6gox2m.live", "l1whn6jhl8xi.live", "hwptyw6xppuu.live", "tkhk0evpw5wi.live", "tdcehfsov6o8.live", "0gylcs3gwdpp.live", "f7lj3cp91c5o.live", "op49rm7r54r1.live", "g8zydz0jz6bv.live", "m588j6oqsmyc.live", "jgckcltjx3q4.live", "gdo249s9ctn2.live", "1l7skmurzjhn.live", "08yr9hhkf9zh.live", "82oolxmgd19l.live", "3ipyuro17prh.live", "e7c1o9hymmkq.live", "i7teaxg9fq17.live", "vwz9poay9t88.live", "kaky1v99z650.live", "z7w1125qgaak.live", "ff7fsl0xpmig.live", "wwp2hnto3y50.live", "xj0airqray7d.live", "x39w37ihaw67.live", "a88mnb53f6ao.live", "agvzlu1xi8aq.live", "rigwjjv5e0te.live", "8f503mspar1t.live", "u86t183m8fjl.live", "n8r9e6f4eybg.live", "twh0pzti1jmc.live", "gxr3yjh3ez0o.live", "13gdw8hd0f5g.live", "u07wbc76jc3l.live", "hadsf1l0oorw.live", "vdx5gmp7hohn.live", "aho8skpvfpxw.live", "bd5sokdfx4rb.live", "di7gouks27ly.live", "9yvk5z9213sf.live", "k2xk3c8ka53h.live", "164kx6yftp7e.live", "p5dpz5k9s4hh.live", "2xokn358s23t.live", "9drofm4qhicr.live", "velmddsj68vd.live", "adu5tcdt1mw8.live", "s1hfevtelz76.live", "y1y2su385jdx.live", "yj4obmh1laef.live", "0i5mk5xlq0p0.live", "sbxmkuudcb2j.live", "bto73r7u8xfq.live", "57qrnj91bqd6.live", "ppakbng3anmz.live", "ydp5gh48yi5c.live", "lnksjujtesl1.live", "toooegs0ua4k.live", "uzpp0a72mgf8.live", "w0qtz6j8u8h0.live", "mmerhgt2a428.live", "k596zkzwcv8x.live", "j7hox858m1yw.live", "vt762jefdhwk.live", "kqofayjh1zst.live", "271bk6bm6ek7.live", "464ulfkbkxi6.live", "fpqzlfi32bhw.live", "x1glqki124qz.live", "4vh1mae0a37r.live", "28gh31g08o7w.live", "bsm3ushv2khf.live", "hxzt6iva3ycu.live", "k6ncoqtenmyi.live", "x7lbv7k4xmot.live", "i3ddusdlpj8z.live", "3yywf2zmb2m5.live", "xx6itd99vg7m.live", "dd9bojxysyeb.live", "u1uaoomqywpz.live", "r4feghmjdqmx.live", "bhkgnyvwctkm.live", "byx6cdkrouzc.live", "65ymc9fdwffj.live", "orp3efts3f5z.live", "2eiuyz0zf5qc.live", "p3840f9xv0n9.live", "8oz8f5ir0n5l.live", "i762u8xbamii.live", "j7hkay3ccvu5.live", "n4jcm1f5n25c.live", "exe12ldlj0nb.live", "z70o1vrhp5kt.live", "4tapo4p2dzqj.live", "9nsdtl72ktuk.live", "ipmh0eee13h2.live", "dg6aspb5wt99.live", "b5n5p7r75ln3.live", "va5rnvsffage.live", "z2ki56hqcxzx.live", "nketun9udno5.live", "v9hu15wlr3a3.live"], "DGA Seed": 18312320459530330518, "Domain Length": 300, "Domain Count": 12}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_BumbleBeeYara detected BumbleBeeJoe Security
    00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Bumblebee_35f50beaunknownunknown
    • 0x2daa1:$a2: 31 DA 48 31 C7 45 D8 C9 B9 E8 03 C7 45 DC 00 00 BA 01 C7 45 E0 00 00 00 48 C7 45 E4 B8 88 77 66 C7 45 E8 55 44 33 22 C7 45 EC 11 FF D0 EB C6 45
    SourceRuleDescriptionAuthorStrings
    3.2.rundll32.exe.22e65fc0000.2.raw.unpackJoeSecurity_BumbleBeeYara detected BumbleBeeJoe Security
      3.2.rundll32.exe.22e65fc0000.2.raw.unpackWindows_Trojan_Bumblebee_35f50beaunknownunknown
      • 0x2daa1:$a2: 31 DA 48 31 C7 45 D8 C9 B9 E8 03 C7 45 DC 00 00 BA 01 C7 45 E0 00 00 00 48 C7 45 E4 B8 88 77 66 C7 45 E8 55 44 33 22 C7 45 EC 11 FF D0 EB C6 45
      3.2.rundll32.exe.22e65fc0000.2.unpackJoeSecurity_BumbleBeeYara detected BumbleBeeJoe Security
        3.2.rundll32.exe.22e65fc0000.2.unpackWindows_Trojan_Bumblebee_35f50beaunknownunknown
        • 0x2cea1:$a2: 31 DA 48 31 C7 45 D8 C9 B9 E8 03 C7 45 DC 00 00 BA 01 C7 45 E0 00 00 00 48 C7 45 E4 B8 88 77 66 C7 45 E8 55 44 33 22 C7 45 EC 11 FF D0 EB C6 45
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 3.2.rundll32.exe.22e65fc0000.2.raw.unpackMalware Configuration Extractor: BumbleBee {"C2 url": ["ejz7h2nwpe9p.live", "tok60x6gccij.live", "aummhmvbuvf7.live", "x5a5l51t3vh5.live", "y82gwd3wieon.live", "b8y5k2ri9mez.live", "cc3bxmp3p9ww.live", "zv119x3fg98y.live", "vrsi1nlyz8hp.live", "u8fbv3mj3v2o.live", "iri6971t7ge3.live", "9nrkgb5ymmhx.live", "72sisvsb57q6.live", "nlkef4koisho.live", "n1gd464fiz18.live", "qmgxpjkisusl.live", "vmh0ep7s9854.live", "vo3yj33yyalx.live", "541xdsl3qrmo.live", "h64g4n2r4pio.live", "bdleys30kkz3.live", "2e0ygf9sxa6j.live", "hlhhny6jyz0h.live", "w2pjbfv1lp0s.live", "ituux0ny27ur.live", "it44epclfvn0.live", "w84emvz3j8hk.live", "t6fln95iafzj.live", "jbo4jhymyavk.live", "y0rqp62hxwp0.live", "rzctrohkd26r.live", "q8txsh5ger29.live", "nmmbz5mvu9b6.live", "forned95q3gl.live", "nvzd7pgfgpxt.live", "y3md2wem8eab.live", "sztn5z9mczvv.live", "hfswfaj1th9o.live", "iaqxv2w3o0xc.live", "ugo1867z96wg.live", "sdj52uv9ye3b.live", "wrkxzshr4idg.live", "4xtvsj1w0qwx.live", "gn5827958xrg.live", "x1jlunfqrqtv.live", "hquppb63rgrg.live", "o91173l27glq.live", "3ysjrezb3os9.live", "5nhc44cf83r7.live", "utltlu232nmc.live", "px5wxjvm0958.live", "sip8h0d4tgrf.live", "3ofolpuywddt.live", "ig42hrwh0svv.live", "r4og0ibkr2i1.live", "s542jqly9hk1.live", "6yb78j9xx6kg.live", "67foms8ek35i.live", "a1xbi34msajq.live", "oltfqksrbe1h.live", "olka4w167pg5.live", "cq72kwl2pw8w.live", "em3wdkia152l.live", "4cxyghx0ba1x.live", "99onc4240lhw.live", "are8uz74o21e.live", "7u78fpro0nvy.live", "mak2p2u1p6oc.live", "3l6704byr3c4.live", "ijxbxsajcb1p.live", "qnlqvmlc95m4.live", "dkm740j7a284.live", "j40qreidx6y3.live", "we0f3yexor36.live", "dd5bzcuuvist.live", "eldzk3tkcta3.live", "a6rtdeit0sty.live", "hu3dj149h820.live", "77mk5fucuhe8.live", "437jwomut9vr.live", "eqg3217g92zf.live", "i22gcdhfevxk.live", "xxdueooznk6v.live", "tzcodnn2epik.live", "ejr4r59avayq.live", "0ws4d9s611dt.live", "frsgmv876w5a.live", "ntrzvqm429kj.live", "3l9jbihmbpmk.live", "cbugpmw95dcb.live", "miq50i5wpk85.live", "h8pwl3uhwlfn.live", "qj3zj9oywxx7.live", "zd6j8je6phb4.live", "t6ocigyxberq.live", "pdim2swkrf2v.live", "mppytmrfpgug.live", "i5ke68h24a00.live", "qxul3spnx991.live", "vzrt76g9gk0g.live", "yc6716yc7nf7.live", "87bnnasq71mu.live", "obmwpmuwhfu7.live", "0aw4a73tdsz1.live", "n6nzy4xlso4s.live", "syhmn2nbxrtr.live", "exiarctkfedq.live", "j5p6emlxlecl.live", "egdk83k09qmr.live", "0fhr0297aorb.live", "6z4lwstr3zxx.live", "lh37yjie545p.live", "lfi8tslls020.live", "ppgwgn0qtww4.live", "0k6o18rmf93s.live", "sucnfknz0x3m.live", "r33j2bx1ieh9.live", "rti8b3e5byh3.live", "uj8gs5xxvv4g.live", "y7bc5b0ezh5m.live", "vh378qqwk9vc.live", "uamdjqdesjmn.live", "rfzo8fwm7pdw.live", "9gle7ejwpees.live", "26wem2p2aunb.live", "2ujyrqt4xzmp.live", "kg6w8hdimtgi.live", "dggn2tge08jf.live", "lygtfikzieri.live", "h8laq4jtyfqp.live", "u6ye5aivfq8b.live", "nwd3emyfsyin.live", "z3atxb3cfji3.live", "w00hvclrjhb1.live", "6mca3un8fmrd.live", "xv8ev6g1h4g3.live", "k1q1fkrd37n3.live", "btf4j310getp.live", "4p06saxn3ubp.live", "5aphqp78vw8h.live", "3r045r8mjwfp.live", "kwekpaz4eobt.liv
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dllReversingLabs: Detection: 13%
        Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{DD475EBC-D960-4AF4-BB8A-BE91FA942756}Jump to behavior
        Source: Binary string: C:\adm\jenkins\workspace\New_RDC_Sol_Plutus_Win_Build_git\2.0\dev\target\win\Release\Adobe Download Manager.pdb source: Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

        Networking

        barindex
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.155.37.158 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.83.20.213 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 46.249.38.179 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 149.154.153.2 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 188.166.15.250 443Jump to behavior
        Source: Malware configuration extractorURLs: ejz7h2nwpe9p.live
        Source: Malware configuration extractorURLs: tok60x6gccij.live
        Source: Malware configuration extractorURLs: aummhmvbuvf7.live
        Source: Malware configuration extractorURLs: x5a5l51t3vh5.live
        Source: Malware configuration extractorURLs: y82gwd3wieon.live
        Source: Malware configuration extractorURLs: b8y5k2ri9mez.live
        Source: Malware configuration extractorURLs: cc3bxmp3p9ww.live
        Source: Malware configuration extractorURLs: zv119x3fg98y.live
        Source: Malware configuration extractorURLs: vrsi1nlyz8hp.live
        Source: Malware configuration extractorURLs: u8fbv3mj3v2o.live
        Source: Malware configuration extractorURLs: iri6971t7ge3.live
        Source: Malware configuration extractorURLs: 9nrkgb5ymmhx.live
        Source: Malware configuration extractorURLs: 72sisvsb57q6.live
        Source: Malware configuration extractorURLs: nlkef4koisho.live
        Source: Malware configuration extractorURLs: n1gd464fiz18.live
        Source: Malware configuration extractorURLs: qmgxpjkisusl.live
        Source: Malware configuration extractorURLs: vmh0ep7s9854.live
        Source: Malware configuration extractorURLs: vo3yj33yyalx.live
        Source: Malware configuration extractorURLs: 541xdsl3qrmo.live
        Source: Malware configuration extractorURLs: h64g4n2r4pio.live
        Source: Malware configuration extractorURLs: bdleys30kkz3.live
        Source: Malware configuration extractorURLs: 2e0ygf9sxa6j.live
        Source: Malware configuration extractorURLs: hlhhny6jyz0h.live
        Source: Malware configuration extractorURLs: w2pjbfv1lp0s.live
        Source: Malware configuration extractorURLs: ituux0ny27ur.live
        Source: Malware configuration extractorURLs: it44epclfvn0.live
        Source: Malware configuration extractorURLs: w84emvz3j8hk.live
        Source: Malware configuration extractorURLs: t6fln95iafzj.live
        Source: Malware configuration extractorURLs: jbo4jhymyavk.live
        Source: Malware configuration extractorURLs: y0rqp62hxwp0.live
        Source: Malware configuration extractorURLs: rzctrohkd26r.live
        Source: Malware configuration extractorURLs: q8txsh5ger29.live
        Source: Malware configuration extractorURLs: nmmbz5mvu9b6.live
        Source: Malware configuration extractorURLs: forned95q3gl.live
        Source: Malware configuration extractorURLs: nvzd7pgfgpxt.live
        Source: Malware configuration extractorURLs: y3md2wem8eab.live
        Source: Malware configuration extractorURLs: sztn5z9mczvv.live
        Source: Malware configuration extractorURLs: hfswfaj1th9o.live
        Source: Malware configuration extractorURLs: iaqxv2w3o0xc.live
        Source: Malware configuration extractorURLs: ugo1867z96wg.live
        Source: Malware configuration extractorURLs: sdj52uv9ye3b.live
        Source: Malware configuration extractorURLs: wrkxzshr4idg.live
        Source: Malware configuration extractorURLs: 4xtvsj1w0qwx.live
        Source: Malware configuration extractorURLs: gn5827958xrg.live
        Source: Malware configuration extractorURLs: x1jlunfqrqtv.live
        Source: Malware configuration extractorURLs: hquppb63rgrg.live
        Source: Malware configuration extractorURLs: o91173l27glq.live
        Source: Malware configuration extractorURLs: 3ysjrezb3os9.live
        Source: Malware configuration extractorURLs: 5nhc44cf83r7.live
        Source: Malware configuration extractorURLs: utltlu232nmc.live
        Source: Malware configuration extractorURLs: px5wxjvm0958.live
        Source: Malware configuration extractorURLs: sip8h0d4tgrf.live
        Source: Malware configuration extractorURLs: 3ofolpuywddt.live
        Source: Malware configuration extractorURLs: ig42hrwh0svv.live
        Source: Malware configuration extractorURLs: r4og0ibkr2i1.live
        Source: Malware configuration extractorURLs: s542jqly9hk1.live
        Source: Malware configuration extractorURLs: 6yb78j9xx6kg.live
        Source: Malware configuration extractorURLs: 67foms8ek35i.live
        Source: Malware configuration extractorURLs: a1xbi34msajq.live
        Source: Malware configuration extractorURLs: oltfqksrbe1h.live
        Source: Malware configuration extractorURLs: olka4w167pg5.live
        Source: Malware configuration extractorURLs: cq72kwl2pw8w.live
        Source: Malware configuration extractorURLs: em3wdkia152l.live
        Source: Malware configuration extractorURLs: 4cxyghx0ba1x.live
        Source: Malware configuration extractorURLs: 99onc4240lhw.live
        Source: Malware configuration extractorURLs: are8uz74o21e.live
        Source: Malware configuration extractorURLs: 7u78fpro0nvy.live
        Source: Malware configuration extractorURLs: mak2p2u1p6oc.live
        Source: Malware configuration extractorURLs: 3l6704byr3c4.live
        Source: Malware configuration extractorURLs: ijxbxsajcb1p.live
        Source: Malware configuration extractorURLs: qnlqvmlc95m4.live
        Source: Malware configuration extractorURLs: dkm740j7a284.live
        Source: Malware configuration extractorURLs: j40qreidx6y3.live
        Source: Malware configuration extractorURLs: we0f3yexor36.live
        Source: Malware configuration extractorURLs: dd5bzcuuvist.live
        Source: Malware configuration extractorURLs: eldzk3tkcta3.live
        Source: Malware configuration extractorURLs: a6rtdeit0sty.live
        Source: Malware configuration extractorURLs: hu3dj149h820.live
        Source: Malware configuration extractorURLs: 77mk5fucuhe8.live
        Source: Malware configuration extractorURLs: 437jwomut9vr.live
        Source: Malware configuration extractorURLs: eqg3217g92zf.live
        Source: Malware configuration extractorURLs: i22gcdhfevxk.live
        Source: Malware configuration extractorURLs: xxdueooznk6v.live
        Source: Malware configuration extractorURLs: tzcodnn2epik.live
        Source: Malware configuration extractorURLs: ejr4r59avayq.live
        Source: Malware configuration extractorURLs: 0ws4d9s611dt.live
        Source: Malware configuration extractorURLs: frsgmv876w5a.live
        Source: Malware configuration extractorURLs: ntrzvqm429kj.live
        Source: Malware configuration extractorURLs: 3l9jbihmbpmk.live
        Source: Malware configuration extractorURLs: cbugpmw95dcb.live
        Source: Malware configuration extractorURLs: miq50i5wpk85.live
        Source: Malware configuration extractorURLs: h8pwl3uhwlfn.live
        Source: Malware configuration extractorURLs: qj3zj9oywxx7.live
        Source: Malware configuration extractorURLs: zd6j8je6phb4.live
        Source: Malware configuration extractorURLs: t6ocigyxberq.live
        Source: Malware configuration extractorURLs: pdim2swkrf2v.live
        Source: Malware configuration extractorURLs: mppytmrfpgug.live
        Source: Malware configuration extractorURLs: i5ke68h24a00.live
        Source: Malware configuration extractorURLs: qxul3spnx991.live
        Source: Malware configuration extractorURLs: vzrt76g9gk0g.live
        Source: Malware configuration extractorURLs: yc6716yc7nf7.live
        Source: Malware configuration extractorURLs: 87bnnasq71mu.live
        Source: Malware configuration extractorURLs: obmwpmuwhfu7.live
        Source: Malware configuration extractorURLs: 0aw4a73tdsz1.live
        Source: Malware configuration extractorURLs: n6nzy4xlso4s.live
        Source: Malware configuration extractorURLs: syhmn2nbxrtr.live
        Source: Malware configuration extractorURLs: exiarctkfedq.live
        Source: Malware configuration extractorURLs: j5p6emlxlecl.live
        Source: Malware configuration extractorURLs: egdk83k09qmr.live
        Source: Malware configuration extractorURLs: 0fhr0297aorb.live
        Source: Malware configuration extractorURLs: 6z4lwstr3zxx.live
        Source: Malware configuration extractorURLs: lh37yjie545p.live
        Source: Malware configuration extractorURLs: lfi8tslls020.live
        Source: Malware configuration extractorURLs: ppgwgn0qtww4.live
        Source: Malware configuration extractorURLs: 0k6o18rmf93s.live
        Source: Malware configuration extractorURLs: sucnfknz0x3m.live
        Source: Malware configuration extractorURLs: r33j2bx1ieh9.live
        Source: Malware configuration extractorURLs: rti8b3e5byh3.live
        Source: Malware configuration extractorURLs: uj8gs5xxvv4g.live
        Source: Malware configuration extractorURLs: y7bc5b0ezh5m.live
        Source: Malware configuration extractorURLs: vh378qqwk9vc.live
        Source: Malware configuration extractorURLs: uamdjqdesjmn.live
        Source: Malware configuration extractorURLs: rfzo8fwm7pdw.live
        Source: Malware configuration extractorURLs: 9gle7ejwpees.live
        Source: Malware configuration extractorURLs: 26wem2p2aunb.live
        Source: Malware configuration extractorURLs: 2ujyrqt4xzmp.live
        Source: Malware configuration extractorURLs: kg6w8hdimtgi.live
        Source: Malware configuration extractorURLs: dggn2tge08jf.live
        Source: Malware configuration extractorURLs: lygtfikzieri.live
        Source: Malware configuration extractorURLs: h8laq4jtyfqp.live
        Source: Malware configuration extractorURLs: u6ye5aivfq8b.live
        Source: Malware configuration extractorURLs: nwd3emyfsyin.live
        Source: Malware configuration extractorURLs: z3atxb3cfji3.live
        Source: Malware configuration extractorURLs: w00hvclrjhb1.live
        Source: Malware configuration extractorURLs: 6mca3un8fmrd.live
        Source: Malware configuration extractorURLs: xv8ev6g1h4g3.live
        Source: Malware configuration extractorURLs: k1q1fkrd37n3.live
        Source: Malware configuration extractorURLs: btf4j310getp.live
        Source: Malware configuration extractorURLs: 4p06saxn3ubp.live
        Source: Malware configuration extractorURLs: 5aphqp78vw8h.live
        Source: Malware configuration extractorURLs: 3r045r8mjwfp.live
        Source: Malware configuration extractorURLs: kwekpaz4eobt.live
        Source: Malware configuration extractorURLs: 0eiko3lmbxbj.live
        Source: Malware configuration extractorURLs: 8vxea0tldluf.live
        Source: Malware configuration extractorURLs: y2ec6qvepl7y.live
        Source: Malware configuration extractorURLs: 5xlu80qs1ox1.live
        Source: Malware configuration extractorURLs: n3om81law5m7.live
        Source: Malware configuration extractorURLs: ei2svhuxkfnm.live
        Source: Malware configuration extractorURLs: kdye9rtnqezb.live
        Source: Malware configuration extractorURLs: boxoxs9gx6f5.live
        Source: Malware configuration extractorURLs: ktzb5e49zz1m.live
        Source: Malware configuration extractorURLs: ymz7vmrsh6eu.live
        Source: Malware configuration extractorURLs: x7dnaw133jnh.live
        Source: Malware configuration extractorURLs: hupacwlnz805.live
        Source: Malware configuration extractorURLs: 1tlgdsxl0pqt.live
        Source: Malware configuration extractorURLs: 3z5rr2y27c6j.live
        Source: Malware configuration extractorURLs: ufiiux335dpw.live
        Source: Malware configuration extractorURLs: vu32g1q7jvl3.live
        Source: Malware configuration extractorURLs: fkvo7y76r6cl.live
        Source: Malware configuration extractorURLs: aa8btew33mma.live
        Source: Malware configuration extractorURLs: yfpmjc270ree.live
        Source: Malware configuration extractorURLs: jrn2pbs4zh17.live
        Source: Malware configuration extractorURLs: 7hxcfu85ux0c.live
        Source: Malware configuration extractorURLs: xkctmynb51ur.live
        Source: Malware configuration extractorURLs: 16fpr15y5e2s.live
        Source: Malware configuration extractorURLs: lxck7t4mnvah.live
        Source: Malware configuration extractorURLs: 2thp12dgf6rb.live
        Source: Malware configuration extractorURLs: vzq8xfz91x5d.live
        Source: Malware configuration extractorURLs: a0xjyxk6h5m7.live
        Source: Malware configuration extractorURLs: l8is8ftcfws6.live
        Source: Malware configuration extractorURLs: qtwfxhporina.live
        Source: Malware configuration extractorURLs: 6lgie8q5pjdc.live
        Source: Malware configuration extractorURLs: 12hpr97amca3.live
        Source: Malware configuration extractorURLs: ya8ym63w9m91.live
        Source: Malware configuration extractorURLs: kiph911rpr6p.live
        Source: Malware configuration extractorURLs: vmduug7itjpc.live
        Source: Malware configuration extractorURLs: q7bu8jglm22a.live
        Source: Malware configuration extractorURLs: 9rfwwr2pkx4u.live
        Source: Malware configuration extractorURLs: 0xejepvnnpze.live
        Source: Malware configuration extractorURLs: fd7cxsr946wv.live
        Source: Malware configuration extractorURLs: nsqum7l04ak6.live
        Source: Malware configuration extractorURLs: 28hnsvxigwgm.live
        Source: Malware configuration extractorURLs: rlezxvz505nn.live
        Source: Malware configuration extractorURLs: r8o1vudqot70.live
        Source: Malware configuration extractorURLs: 5ax9d1kvmld4.live
        Source: Malware configuration extractorURLs: fum22rxxfolh.live
        Source: Malware configuration extractorURLs: w525f7mmd4ms.live
        Source: Malware configuration extractorURLs: 19pubdw7x197.live
        Source: Malware configuration extractorURLs: 23k1m1uhe7kg.live
        Source: Malware configuration extractorURLs: w3d73cw4ayun.live
        Source: Malware configuration extractorURLs: e8y8k4xhyx42.live
        Source: Malware configuration extractorURLs: lsogs7k1lsrr.live
        Source: Malware configuration extractorURLs: vxcd26ui2k5o.live
        Source: Malware configuration extractorURLs: vlqwx3ydmtxh.live
        Source: Malware configuration extractorURLs: 0vyvyfx6ymxv.live
        Source: Malware configuration extractorURLs: mrwrxcp86n8e.live
        Source: Malware configuration extractorURLs: dxwhiektvxsc.live
        Source: Malware configuration extractorURLs: zaig1x6gox2m.live
        Source: Malware configuration extractorURLs: l1whn6jhl8xi.live
        Source: Malware configuration extractorURLs: hwptyw6xppuu.live
        Source: Malware configuration extractorURLs: tkhk0evpw5wi.live
        Source: Malware configuration extractorURLs: tdcehfsov6o8.live
        Source: Malware configuration extractorURLs: 0gylcs3gwdpp.live
        Source: Malware configuration extractorURLs: f7lj3cp91c5o.live
        Source: Malware configuration extractorURLs: op49rm7r54r1.live
        Source: Malware configuration extractorURLs: g8zydz0jz6bv.live
        Source: Malware configuration extractorURLs: m588j6oqsmyc.live
        Source: Malware configuration extractorURLs: jgckcltjx3q4.live
        Source: Malware configuration extractorURLs: gdo249s9ctn2.live
        Source: Malware configuration extractorURLs: 1l7skmurzjhn.live
        Source: Malware configuration extractorURLs: 08yr9hhkf9zh.live
        Source: Malware configuration extractorURLs: 82oolxmgd19l.live
        Source: Malware configuration extractorURLs: 3ipyuro17prh.live
        Source: Malware configuration extractorURLs: e7c1o9hymmkq.live
        Source: Malware configuration extractorURLs: i7teaxg9fq17.live
        Source: Malware configuration extractorURLs: vwz9poay9t88.live
        Source: Malware configuration extractorURLs: kaky1v99z650.live
        Source: Malware configuration extractorURLs: z7w1125qgaak.live
        Source: Malware configuration extractorURLs: ff7fsl0xpmig.live
        Source: Malware configuration extractorURLs: wwp2hnto3y50.live
        Source: Malware configuration extractorURLs: xj0airqray7d.live
        Source: Malware configuration extractorURLs: x39w37ihaw67.live
        Source: Malware configuration extractorURLs: a88mnb53f6ao.live
        Source: Malware configuration extractorURLs: agvzlu1xi8aq.live
        Source: Malware configuration extractorURLs: rigwjjv5e0te.live
        Source: Malware configuration extractorURLs: 8f503mspar1t.live
        Source: Malware configuration extractorURLs: u86t183m8fjl.live
        Source: Malware configuration extractorURLs: n8r9e6f4eybg.live
        Source: Malware configuration extractorURLs: twh0pzti1jmc.live
        Source: Malware configuration extractorURLs: gxr3yjh3ez0o.live
        Source: Malware configuration extractorURLs: 13gdw8hd0f5g.live
        Source: Malware configuration extractorURLs: u07wbc76jc3l.live
        Source: Malware configuration extractorURLs: hadsf1l0oorw.live
        Source: Malware configuration extractorURLs: vdx5gmp7hohn.live
        Source: Malware configuration extractorURLs: aho8skpvfpxw.live
        Source: Malware configuration extractorURLs: bd5sokdfx4rb.live
        Source: Malware configuration extractorURLs: di7gouks27ly.live
        Source: Malware configuration extractorURLs: 9yvk5z9213sf.live
        Source: Malware configuration extractorURLs: k2xk3c8ka53h.live
        Source: Malware configuration extractorURLs: 164kx6yftp7e.live
        Source: Malware configuration extractorURLs: p5dpz5k9s4hh.live
        Source: Malware configuration extractorURLs: 2xokn358s23t.live
        Source: Malware configuration extractorURLs: 9drofm4qhicr.live
        Source: Malware configuration extractorURLs: velmddsj68vd.live
        Source: Malware configuration extractorURLs: adu5tcdt1mw8.live
        Source: Malware configuration extractorURLs: s1hfevtelz76.live
        Source: Malware configuration extractorURLs: y1y2su385jdx.live
        Source: Malware configuration extractorURLs: yj4obmh1laef.live
        Source: Malware configuration extractorURLs: 0i5mk5xlq0p0.live
        Source: Malware configuration extractorURLs: sbxmkuudcb2j.live
        Source: Malware configuration extractorURLs: bto73r7u8xfq.live
        Source: Malware configuration extractorURLs: 57qrnj91bqd6.live
        Source: Malware configuration extractorURLs: ppakbng3anmz.live
        Source: Malware configuration extractorURLs: ydp5gh48yi5c.live
        Source: Malware configuration extractorURLs: lnksjujtesl1.live
        Source: Malware configuration extractorURLs: toooegs0ua4k.live
        Source: Malware configuration extractorURLs: uzpp0a72mgf8.live
        Source: Malware configuration extractorURLs: w0qtz6j8u8h0.live
        Source: Malware configuration extractorURLs: mmerhgt2a428.live
        Source: Malware configuration extractorURLs: k596zkzwcv8x.live
        Source: Malware configuration extractorURLs: j7hox858m1yw.live
        Source: Malware configuration extractorURLs: vt762jefdhwk.live
        Source: Malware configuration extractorURLs: kqofayjh1zst.live
        Source: Malware configuration extractorURLs: 271bk6bm6ek7.live
        Source: Malware configuration extractorURLs: 464ulfkbkxi6.live
        Source: Malware configuration extractorURLs: fpqzlfi32bhw.live
        Source: Malware configuration extractorURLs: x1glqki124qz.live
        Source: Malware configuration extractorURLs: 4vh1mae0a37r.live
        Source: Malware configuration extractorURLs: 28gh31g08o7w.live
        Source: Malware configuration extractorURLs: bsm3ushv2khf.live
        Source: Malware configuration extractorURLs: hxzt6iva3ycu.live
        Source: Malware configuration extractorURLs: k6ncoqtenmyi.live
        Source: Malware configuration extractorURLs: x7lbv7k4xmot.live
        Source: Malware configuration extractorURLs: i3ddusdlpj8z.live
        Source: Malware configuration extractorURLs: 3yywf2zmb2m5.live
        Source: Malware configuration extractorURLs: xx6itd99vg7m.live
        Source: Malware configuration extractorURLs: dd9bojxysyeb.live
        Source: Malware configuration extractorURLs: u1uaoomqywpz.live
        Source: Malware configuration extractorURLs: r4feghmjdqmx.live
        Source: Malware configuration extractorURLs: bhkgnyvwctkm.live
        Source: Malware configuration extractorURLs: byx6cdkrouzc.live
        Source: Malware configuration extractorURLs: 65ymc9fdwffj.live
        Source: Malware configuration extractorURLs: orp3efts3f5z.live
        Source: Malware configuration extractorURLs: 2eiuyz0zf5qc.live
        Source: Malware configuration extractorURLs: p3840f9xv0n9.live
        Source: Malware configuration extractorURLs: 8oz8f5ir0n5l.live
        Source: Malware configuration extractorURLs: i762u8xbamii.live
        Source: Malware configuration extractorURLs: j7hkay3ccvu5.live
        Source: Malware configuration extractorURLs: n4jcm1f5n25c.live
        Source: Malware configuration extractorURLs: exe12ldlj0nb.live
        Source: Malware configuration extractorURLs: z70o1vrhp5kt.live
        Source: Malware configuration extractorURLs: 4tapo4p2dzqj.live
        Source: Malware configuration extractorURLs: 9nsdtl72ktuk.live
        Source: Malware configuration extractorURLs: ipmh0eee13h2.live
        Source: Malware configuration extractorURLs: dg6aspb5wt99.live
        Source: Malware configuration extractorURLs: b5n5p7r75ln3.live
        Source: Malware configuration extractorURLs: va5rnvsffage.live
        Source: Malware configuration extractorURLs: z2ki56hqcxzx.live
        Source: Malware configuration extractorURLs: nketun9udno5.live
        Source: Malware configuration extractorURLs: v9hu15wlr3a3.live
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FCFC4C InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,std::_Deallocate, https://api.ipify.org/3_2_0000022E65FCFC4C
        Source: Joe Sandbox ViewIP Address: 188.166.15.250 188.166.15.250
        Source: Joe Sandbox ViewASN Name: EDIS-AS-EUAT EDIS-AS-EUAT
        Source: Joe Sandbox ViewASN Name: SHOCK-1US SHOCK-1US
        Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
        Source: Joe Sandbox ViewASN Name: DEDIPATH-LLCUS DEDIPATH-LLCUS
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F4FB0 select,__WSAFDIsSet,__WSAFDIsSet,recv,WSAGetLastError,Sleep,WSAGetLastError,getsockopt,getsockopt,std::_Deallocate,std::_Deallocate,WSAGetLastError,WSAGetLastError,3_2_0000022E660F4FB0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://myexternalip.com/raw
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://ocsp.digicert.com0
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://ocsp.digicert.com0A
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://ocsp.digicert.com0X
        Source: Reader_Install_Setup.exe, 00000002.00000002.4178286591.0000000007642000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/0000000000000000000176ff
        Source: Reader_Install_Setup.exe, 00000002.00000002.4184616950.0000000009702000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/000000000000000000017701
        Source: Reader_Install_Setup.exe, 00000002.00000002.4184616950.0000000009702000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/000000000000000000017702
        Source: Reader_Install_Setup.exe, 00000002.00000002.4178286591.0000000007642000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/000000000000000000017703
        Source: Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4178286591.00000000076AA000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4173381032.000000000356B000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/000000000000000000017704
        Source: Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4178286591.00000000076AA000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4173381032.000000000356B000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: http://typekit.com/eulas/000000000000000000017706
        Source: Reader_Install_Setup.exe.1.drString found in binary or memory: http://www.digicert.com/CPS0
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org/http://myexternalip.com/rawIP
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000003.1761747071.00000000094A0000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1756406466.0000000007729000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4182341319.0000000009260000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1760605699.00000000077A0000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1756350671.0000000009698000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1750169262.0000000003570000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://getbootstrap.com/)
        Source: Reader_Install_Setup.exeString found in binary or memory: https://github.com/Fin
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177803623.00000000074CA000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1750611438.0000000003560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Financial-Times/polyfill-service/issues/317
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000003.1761747071.00000000094A0000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4182341319.0000000009260000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1756350671.0000000009698000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1750169262.0000000003570000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/twbs/bootstrap/blob/main/LICENSE)
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000002.4178233121.00000000075B0000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1748114672.00000000075B5000.00000004.00000020.00020000.00000000.sdmp, 231[1].2.drString found in binary or memory: https://mths.be/array-from
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000002.4178233121.00000000075B0000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1748114672.00000000075B5000.00000004.00000020.00020000.00000000.sdmp, 231[1].2.drString found in binary or memory: https://mths.be/array-of
        Source: Reader_Install_Setup.exe, 00000002.00000002.4178433184.000000000771A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://p.typekit.net/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177118828.000000000741D000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://p.typekit.net/p.gif
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4178433184.0000000007749000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://p.typekit.net/p.gif?s=1&k=bxf0ivf&ht=tk&h=C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5CTemp%5CPa
        Source: Reader_Install_Setup.exe, 00000002.00000002.4178433184.000000000771A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rdc.adobe.io/SZ%
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176878067.0000000004990000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.00000000014B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rdc.adobe.io/adm/actionList
        Source: Reader_Install_Setup.exe, 00000002.00000002.4178433184.000000000779F000.00000004.00000020.00020000.00000000.sdmp, Adobe_ADM.log.2.drString found in binary or memory: https://rdc.adobe.io/adm/actionList?installerName=readerdc64_en_ha_install.exe&defaultInstallerName=
        Source: Reader_Install_Setup.exe, 00000002.00000002.4184569460.0000000009630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rdc.adobe.io/analytics/events66
        Source: Reader_Install_Setup.exe, 00000002.00000002.4184569460.0000000009630000.00000004.00000020.00020000.00000000.sdmp, Adobe_ADM.log.2.drString found in binary or memory: https://rdc.adobe.io/analytics/events?UniqueId=CE1680CB-B496-484F-B8BA-A7D159A1C243&abbr=rdr&admErro
        Source: Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://rdc.adobe.io/analytics/eventsanalyticstestWorkflowApplication
        Source: Reader_Install_Setup.exe, 00000002.00000002.4184569460.0000000009630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rdc.adobe.io:443/analytics/events?UniqueId=CE1680CB-B496-484F-B8BA-A7D159A1C243&abbr=rdr&adm
        Source: Reader_Install_Setup.exe, 00000002.00000003.1761945684.0000000007675000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/docs/error-decoder.html?invariant=
        Source: Reader_Install_Setup.exe, 00000002.00000003.1749394309.00000000089DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/docs/error-decoder.html?invariant=arguments.length
        Source: Reader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000002.4183756273.00000000093F0000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1749261059.00000000089FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/link/react-polyfills
        Source: Reader_Install_Setup.exe, 00000002.00000002.4183756273.00000000093F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/link/react-polyfillsThis
        Source: Reader_Install_Setup.exe, 00000002.00000003.1749261059.00000000089FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/link/react-polyfillsn.unstable_shouldYieldn.unstable_forceFrameRate
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/-U
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/4b3e87/000000000000000000017706/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/4b3e87/000000000000000000017706/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/4b3e87/000000000000000000017706/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/4b3e87/000000000000000000017706/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/74ffb1/000000000000000000017702/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/74ffb1/000000000000000000017702/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/74ffb1/000000000000000000017702/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/74ffb1/000000000000000000017702/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/a2527e/000000000000000000017704/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/a2527e/000000000000000000017704/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4178433184.0000000007749000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/a2527e/000000000000000000017704/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/a2527e/000000000000000000017704/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/a?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/l?primer=0635fba006f1437d962ae878ad04a
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.00000000014B4000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, 160[1].2.drString found in binary or memory: https://use.typekit.net/bxf0ivf.js
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.00000000014B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/bxf0ivf.js020
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.00000000014B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/bxf0ivf.jsQ
        Source: Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/bxf0ivf.jsRc
        Source: Reader_Install_Setup.exe, 00000002.00000003.1749261059.00000000089FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/bxf0ivf.jsn.type
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.typekit.net/uT

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 3.2.rundll32.exe.22e65fc0000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.22e65fc0000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 3.2.rundll32.exe.22e65fc0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Bumblebee_35f50bea Author: unknown
        Source: 3.2.rundll32.exe.22e65fc0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Bumblebee_35f50bea Author: unknown
        Source: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Bumblebee_35f50bea Author: unknown
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEF23C GetModuleHandleA,GetProcAddress,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,3_2_0000022E65FEF23C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65CA8C31 NtCreateSection,3_2_0000022E65CA8C31
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65CA9390 NtOpenFile,3_2_0000022E65CA9390
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65CA8D40 NtCreateSection,NtMapViewOfSection,3_2_0000022E65CA8D40
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\411fe0.msiJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{DD475EBC-D960-4AF4-BB8A-BE91FA942756}Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2128.tmpJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\411fe2.msiJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\411fe2.msiJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\411fe2.msiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00B599E02_2_00B599E0
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00B43BB02_2_00B43BB0
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00B5F4C02_2_00B5F4C0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F74503_2_0000022E660F7450
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F60B03_2_0000022E660F60B0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F4FB03_2_0000022E660F4FB0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FD505C3_2_0000022E65FD505C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F7B203_2_0000022E660F7B20
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F6C603_2_0000022E660F6C60
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F57C03_2_0000022E660F57C0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E661222883_2_0000022E66122288
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E661202B03_2_0000022E661202B0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC61C83_2_0000022E65FC61C8
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC41603_2_0000022E65FC4160
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF01103_2_0000022E65FF0110
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FFD4603_2_0000022E65FFD460
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC63A43_2_0000022E65FC63A4
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6611B21C3_2_0000022E6611B21C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC42903_2_0000022E65FC4290
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6610E2503_2_0000022E6610E250
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF8E203_2_0000022E65FF8E20
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF0E003_2_0000022E65FF0E00
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E66068F003_2_0000022E66068F00
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E661020403_2_0000022E66102040
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC40403_2_0000022E65FC4040
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E66129CC83_2_0000022E66129CC8
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6611ACD43_2_0000022E6611ACD4
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FCCFA03_2_0000022E65FCCFA0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FE5F503_2_0000022E65FE5F50
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FD9F183_2_0000022E65FD9F18
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF4EC03_2_0000022E65FF4EC0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FCBE7C3_2_0000022E65FCBE7C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6611FAE03_2_0000022E6611FAE0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FFDB403_2_0000022E65FFDB40
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC39303_2_0000022E65FC3930
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6610E8703_2_0000022E6610E870
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF8B703_2_0000022E65FF8B70
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FC3AC03_2_0000022E65FC3AC0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FFBAAF3_2_0000022E65FFBAAF
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FE5A903_2_0000022E65FE5A90
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FFC6FA3_2_0000022E65FFC6FA
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E661205283_2_0000022E66120528
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEB7683_2_0000022E65FEB768
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF87203_2_0000022E65FF8720
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FFB71F3_2_0000022E65FFB71F
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FDA6E83_2_0000022E65FDA6E8
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E6610E6103_2_0000022E6610E610
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFDFA5B5A533_2_00007FFDFA5B5A53
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFDFA5B5A303_2_00007FFDFA5B5A30
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFDFA5B6D103_2_00007FFDFA5B6D10
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFDFA5B57603_2_00007FFDFA5B5760
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65CA7DA43_2_0000022E65CA7DA4
        Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000022E65FC67EC appears 95 times
        Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000022E65FCF290 appears 95 times
        Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000022E660CF158 appears 42 times
        Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000022E65FD1A6C appears 41 times
        Source: Reader_Install_Setup.exe.1.drStatic PE information: Resource name: PNG type: DOS executable (COM, 0x8C-variant)
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
        Source: 3.2.rundll32.exe.22e65fc0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Bumblebee_35f50bea reference_sample = 9fff05a5aa9cbbf7d37bc302d8411cbd63fb3a28dc6f5163798ae899b9edcda6, os = windows, severity = x86, creation_date = 2022-04-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Bumblebee, fingerprint = f2e07a9b7d143ca13852f723e7d0bd55365d6f8b5d9315b7e24b7f1101010820, id = 35f50bea-c497-4cc6-b915-8ad3aca7bee6, last_modified = 2022-06-09
        Source: 3.2.rundll32.exe.22e65fc0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Bumblebee_35f50bea reference_sample = 9fff05a5aa9cbbf7d37bc302d8411cbd63fb3a28dc6f5163798ae899b9edcda6, os = windows, severity = x86, creation_date = 2022-04-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Bumblebee, fingerprint = f2e07a9b7d143ca13852f723e7d0bd55365d6f8b5d9315b7e24b7f1101010820, id = 35f50bea-c497-4cc6-b915-8ad3aca7bee6, last_modified = 2022-06-09
        Source: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Bumblebee_35f50bea reference_sample = 9fff05a5aa9cbbf7d37bc302d8411cbd63fb3a28dc6f5163798ae899b9edcda6, os = windows, severity = x86, creation_date = 2022-04-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Bumblebee, fingerprint = f2e07a9b7d143ca13852f723e7d0bd55365d6f8b5d9315b7e24b7f1101010820, id = 35f50bea-c497-4cc6-b915-8ad3aca7bee6, last_modified = 2022-06-09
        Source: Reader_Install_Setup.exe.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.9888474447202166
        Source: classification engineClassification label: mal100.troj.evad.winMSI@6/73@0/5
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF4DE0 CreateToolhelp32Snapshot,Process32FirstW,StrCmpIW,CloseHandle,Process32NextW,StrCmpIW,Process32NextW,CloseHandle,3_2_0000022E65FF4DE0
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF1450 CoCreateInstance,CoSetProxyBlanket,GetModuleHandleW,GetProcAddress,CoSetProxyBlanket,new,_com_util::ConvertStringToBSTR,_com_issue_error,new,_com_util::ConvertStringToBSTR,_com_issue_error,SysFreeString,SysFreeString,VariantInit,VariantClear,3_2_0000022E65FF1450
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CML2185.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMutant created: \Sessions\1\BaseNamedObjects\Adobe_ADM.log
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMutant created: \Sessions\1\BaseNamedObjects\Adobe_GDE.log
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFCDF6CF734A63117B.TMPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe "rundll32.exe" "C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServer
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
        Source: Acrobat_DC_x64_VIP_v10.12.msiStatic file information: TRID: Microsoft Windows Installer (60509/1) 88.31%
        Source: Reader_Install_Setup.exeString found in binary or memory: {\r\n .yZVqwct25RQtg_rJyphu {\r\n -ms-flex-flow: row nowrap;\r\n flex-flow: row nowrap;\r\n -ms-flex-pack: start;\r\n justify-content: flex-start;\r\n }\r\n .yZVqwct25RQtg_rJyphu .UdZ9h4yDyt7zzl_efcFz {\r\n -ms-flex-direction: row;\r\n fle
        Source: Reader_Install_Setup.exeString found in binary or memory: essage": "Congratulations" }, "ActionList_Verify": { "message": "Verifying install..." }, "ActionList_ErrorUpdateMessage": { "message": "The command line argument -installer is required but not provided." }, "ActionList_AlreadyExist
        Source: Reader_Install_Setup.exeString found in binary or memory: 95GF_bATvy {\r\n z-index: 1;\r\n}\r\n\r\n.zL1_mT_7fs5uZHMuZ2nw {\r\n display: -ms-flexbox;\r\n display: flex;\r\n -ms-flex-wrap: wrap;\r\n flex-wrap: wrap;\r\n -ms-flex-pack: start;\r\n justify-content: flex-start;\r\n}\r\n\r\n.zL1_mT_7fs5uZHMuZ2nw .c1S
        Source: Reader_Install_Setup.exeString found in binary or memory: -start;\r\n }\r\n .g82qRD5i9MRBdeNytiPv .UdZ9h4yDyt7zzl_efcFz {\r\n -ms-flex-direction: row;\r\n flex-direction: row;\r\n }\r\n .g82qRD5i9MRBdeNytiPv .UdZ9h4yDyt7zzl_efcFz .WNvdx4uqUWtr9A7ET3s8 {\r\n position: absolute;\r\n }\r\n .g82qRD5i9MRBde
        Source: Reader_Install_Setup.exeString found in binary or memory: t !important;\r\n justify-content: flex-start !important;\r\n }\r\n .mXqDCUtaC_JMHMad0ZwV {\r\n -ms-flex-pack: end !important;\r\n justify-content: flex-end !important;\r\n }\r\n .qOrqtkCp3ivHw7SVfILq {\r\n -ms-flex-pack: center !important;\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: lgende program(mer) bruger filer, som skal opdateres af Acrobat-installationen. Disse filer opdateres senere, efter disse programmer er blevet genstartet:" }, "ButtonOK": { "message": "OK" }, "ReaderSAPP_UninstallMessage": { "message": "F
        Source: Reader_Install_Setup.exeString found in binary or memory: y-content: space-around !important;\r\n }\r\n .SkBdZQ4j6W8eEExZe0hD {\r\n -ms-flex-align: start !important;\r\n align-items: flex-start !important;\r\n }\r\n .WAJbhUQHN23bq7qy5Sn4 {\r\n -ms-flex-align: end !important;\r\n align-items: flex-end
        Source: Reader_Install_Setup.exeString found in binary or memory: er-mid marker-start overline-position overline-thickness paint-order panose-1 pointer-events rendering-intent shape-rendering stop-color stop-opacity strikethrough-position strikethrough-thickness stroke-dasharray stroke-dashoffset stroke-linecap stroke-linejo
        Source: Reader_Install_Setup.exeString found in binary or memory: che Fertig stellen und starten Sie den Installationsvorgang neu." }, "invalidSKU": { "message": "Das {0}-Installationsprogramm ist veraltet oder eine Datei wurde umbenannt. Klicken Sie auf Fertig stellen, um das aktuelle Installa
        Source: Reader_Install_Setup.exeString found in binary or memory: .Km2Za0W8caH7Y94_8Cii {\r\n -ms-flex-align: stretch !important;\r\n align-items: stretch !important;\r\n }\r\n .W43tG1Sz8VgKlzT3ABdI {\r\n -ms-flex-line-pack: start !important;\r\n align-content: flex-start !important;\r\n }\r\n .jl0mwv_1IlwXKT
        Source: Reader_Install_Setup.exeString found in binary or memory: art;\r\n align-items: flex-start;\r\n -ms-flex-pack: center;\r\n justify-content: center;\r\n}\r\n\r\n.KreO5lkqzKRYE6kMOpU8 > .SI26_236LLhD2moOSicV,\r\n.KreO5lkqzKRYE6kMOpU8 > .znKiFK8BtK3Ryz9nqB1f {\r\n width: 100%;\r\n}\r\n\r\n.KreO5lkqzKRYE6kMOpU8 > .SI
        Source: Reader_Install_Setup.exeString found in binary or memory: -flex-flow: row nowrap;\r\n flex-flow: row nowrap;\r\n -ms-flex-pack: start;\r\n justify-content: flex-start;\r\n }\r\n .HR7PgL6swGh5IOFzTcX2 .UdZ9h4yDyt7zzl_efcFz {\r\n -ms-flex-direction: row;\r\n flex-direction: row;\r\n }\r\n .HR7PgL6swG
        Source: Reader_Install_Setup.exeString found in binary or memory: gn: start !important;\r\n align-self: flex-start !important;\r\n }\r\n .eLScPzCVVKub71kFSTo6 {\r\n -ms-flex-item-align: end !important;\r\n align-self: flex-end !important;\r\n }\r\n .AjPsmeBDtyK_yy_tIXdq {\r\n -ms-flex-item-align: center !impo
        Source: Reader_Install_Setup.exeString found in binary or memory: -ms-flex-pack: start;\r\n justify-content: flex-start;\r\n}\r\n\r\n.q2Zc28XrMrY0gB3RKQXQ > .P9ttp5CfYv4K8NwPCfAS,\r\n.q2Zc28XrMrY0gB3RKQXQ > .m8oOHyBtRiyoCu3QS5_q, .q2Zc28XrMrY0gB3RKQXQ > .uTTRfMaOKj_KeT7DYxKx, .q2Zc28XrMrY0gB3RKQXQ > .iJvWw3vT2QR1DLdPDvu3, .
        Source: Reader_Install_Setup.exeString found in binary or memory: "flex-shrink-0":"on8QKWtR02qa9o9le_l4","flex-shrink-1":"sSYTlm_fbXuMQ2nOLx0w","justify-content-start":"DASZHkth1o5IOMZyhTDx","justify-content-end":"LAWb7Cbf0N5DYoYZseWF","justify-content-center":"FXBomI8D0oPm5hc8wxwA","justify-content-between":"wcoUwDW3XLAvF5X
        Source: Reader_Install_Setup.exeString found in binary or memory: \r\n\r\n.sSYTlm_fbXuMQ2nOLx0w {\r\n -ms-flex-negative: 1 !important;\r\n flex-shrink: 1 !important;\r\n}\r\n\r\n.DASZHkth1o5IOMZyhTDx {\r\n -ms-flex-pack: start !important;\r\n justify-content: flex-start !important;\r\n}\r\n\r\n.LAWb7Cbf0N5DYoYZseWF {\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: Hf_0","justify-content-around":"YZxKsrbvidFu366yCv8k","align-items-start":"kzhaT0Oba_fChd17ICcv","align-items-end":"DfrSF9G_NhJxaBrTyI9E","align-items-center":"T2gjS8V2_aCimczn_mvA","align-items-baseline":"wvV162mt8CM64dJRJC_K","align-items-stretch":"uwleunsKz
        Source: Reader_Install_Setup.exeString found in binary or memory: ustify-content: flex-start !important;\r\n }\r\n .y9ejXHhttjAEgovYXYMU {\r\n -ms-flex-pack: end !important;\r\n justify-content: flex-end !important;\r\n }\r\n .COPRSpy9kETB_SZQ4smx {\r\n -ms-flex-pack: center !important;\r\n justify-content: c
        Source: Reader_Install_Setup.exeString found in binary or memory: r\n justify-content: flex-start;\r\n align-items: flex-end;\r\n}\r\n\r\n.IDKVSl_h7I8AUkTJyJZR{\r\n color:#505050;\r\n margin-left: auto;\r\n}\r\n\r\n.mdye5L_d5nxHhgXOJzOl {\r\n background-color: #2680eb\r\n}\r\n\r\n.uA6xPsp_APEYTCYzQpAm {\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: ZoW2nYlOE4","align-content-start":"Ux_l3vTkayi2Nq7VsaVG","align-content-end":"NeoGktt2uqAOkIls2tkD","align-content-center":"kFFYrbLbLECA7hshfgB4","align-content-between":"_ovIEpiGXhGpst7ciRVY","align-content-around":"lkHcf3zkijisAIDcTRgA","align-content-stretc
        Source: Reader_Install_Setup.exeString found in binary or memory: ":"NEedZEkDvapuuRM76fDm","align-self-auto":"HZJOrTsRFta7TuRD5mLC","align-self-start":"OcYm86Cu28Oe4t9OrHGy","align-self-end":"Wie7fqOQFV_ARe1Jw09R","align-self-center":"M8kCN1fgOGwZVFJ3wLAX","align-self-baseline":"JItXRBa5bZTWWkWA6xmX","align-self-stretch":"B3
        Source: Reader_Install_Setup.exeString found in binary or memory: d !important;\r\n }\r\n .AwPLyaWsRJ3kVfxTYAKZ {\r\n -ms-flex-align: start !important;\r\n align-items: flex-start !important;\r\n }\r\n .JLhQyJ9YeJ2Xzm4rGI0o {\r\n -ms-flex-align: end !important;\r\n align-items: flex-end !important;\r\n }\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: lign-items: flex-start !important;\r\n}\r\n\r\n.DfrSF9G_NhJxaBrTyI9E {\r\n -ms-flex-align: end !important;\r\n align-items: flex-end !important;\r\n}\r\n\r\n.T2gjS8V2_aCimczn_mvA {\r\n -ms-flex-align: center !important;\r\n align-items: center !important;\
        Source: Reader_Install_Setup.exeString found in binary or memory: {\r\n -ms-flex-align: stretch !important;\r\n align-items: stretch !important;\r\n }\r\n .kaIxRiZtzxK_YyZMBHo_ {\r\n -ms-flex-line-pack: start !important;\r\n align-content: flex-start !important;\r\n }\r\n .l1QG33TebFm8kJRTmnh7 {\r\n -ms-fl
        Source: Reader_Install_Setup.exeString found in binary or memory: aVG {\r\n -ms-flex-line-pack: start !important;\r\n align-content: flex-start !important;\r\n}\r\n\r\n.NeoGktt2uqAOkIls2tkD {\r\n -ms-flex-line-pack: end !important;\r\n align-content: flex-end !important;\r\n}\r\n\r\n.kFFYrbLbLECA7hshfgB4 {\r\n -ms-flex-
        Source: Reader_Install_Setup.exeString found in binary or memory: y-content-sm-start":"B5btvvlXn96uf7yGf1tR","justify-content-sm-end":"PoT2qU4sMKBleURcc2cJ","justify-content-sm-center":"AVIeQzlddzrtDxIBXkKd","justify-content-sm-between":"ivJwQA579UzEbjI7CkZ_","justify-content-sm-around":"z68IWjEqXuP67bRb8eEp","align-items-sm
        Source: Reader_Install_Setup.exeString found in binary or memory: start":"fJTv_QJTsr6EO2H1q4V3","align-items-sm-end":"w8v8i3VE57doJW3WhKMD","align-items-sm-center":"xPBnP81DTQHre7ixEe_q","align-items-sm-baseline":"Fv8YCtye3D9Er3k3sYNM","align-items-sm-stretch":"V6bazQgwJb2yoGr1NWeW","align-content-sm-start":"WLLVW2mH0bVmfnnP
        Source: Reader_Install_Setup.exeString found in binary or memory: ;\r\n align-self: auto !important;\r\n}\r\n\r\n.OcYm86Cu28Oe4t9OrHGy {\r\n -ms-flex-item-align: start !important;\r\n align-self: flex-start !important;\r\n}\r\n\r\n.Wie7fqOQFV_ARe1Jw09R {\r\n -ms-flex-item-align: end !important;\r\n align-self: flex-end
        Source: Reader_Install_Setup.exeString found in binary or memory: sm-auto":"IzdFJiZ2UCQMY9aGg_QA","align-self-sm-start":"iiYDHEA6tQXlGqaKw7jz","align-self-sm-end":"uq0dyk4fScobfEBVnATd","align-self-sm-center":"UpE4hJfsUm5TuZtTZvsv","align-self-sm-baseline":"e4_Oxc7RitQH_sjNSulu","align-self-sm-stretch":"k3cpKukN1yqN0o_bwWbO"
        Source: Reader_Install_Setup.exeString found in binary or memory: r\n align-self: flex-start !important;\r\n }\r\n .gvNgooS8lRGqBrL8T2NG {\r\n -ms-flex-item-align: end !important;\r\n align-self: flex-end !important;\r\n }\r\n .hd7N4PctGEIBBTckCPnz {\r\n -ms-flex-item-align: center !important;\r\n align-se
        Source: Reader_Install_Setup.exeString found in binary or memory: -reverse":"vy8MgiufjANaWTk_ZwWQ","flex-md-fill":"Oew_loBO0_dkmOrnii5w","flex-md-grow-0":"suF3M9_Dg1jwPDHryUtV","flex-md-grow-1":"NgldPqvt9DiqtAbphcRj","flex-md-shrink-0":"InhTYOgC9dF8dQSb1MLY","flex-md-shrink-1":"OqqmkSrciAjIMRn4zhht","justify-content-md-start
        Source: Reader_Install_Setup.exeString found in binary or memory: :"hkIpV6klVOwAo752VSvr","justify-content-md-end":"eLk5KmeziN3FG_ZvWUbk","justify-content-md-center":"wx9l9CrohZahb5XLMrGW","justify-content-md-between":"ysWVT3V793_xoLXozo0y","justify-content-md-around":"cCZYopTiajqBE6zSF4mb","align-items-md-start":"THpMIn_rv9
        Source: Reader_Install_Setup.exeString found in binary or memory: C"),a=!0,l="launchReader"),"true"===o.showLaunchAcrobat&&(i=t("Launch_Acrobat"),a=!0,l="launchAcrobat"),"true"===o.showLaunchReaderSAPP&&(i=t("Launch_Reader_DC"),a=!0,l="launchReaderSAPP")),a){var f="0";s&&(f="1");var p="<data><launchReaderSAPP>"+f+"</launchRe
        Source: Reader_Install_Setup.exeString found in binary or memory: XJ1zTlRSw","align-items-md-end":"GDHTGrjlGD0S0f1_DiJ5","align-items-md-center":"wtOokl2f_oejiBt8WE_w","align-items-md-baseline":"RZpDrGEVofFZ2OwqC2qL","align-items-md-stretch":"wekS_MR1HkGU6Ej1xqxk","align-content-md-start":"LkRjjQuLuuq2HISiPqJR","align-conten
        Source: Reader_Install_Setup.exeString found in binary or memory: s-flexbox;\r\n display: flex;\r\n -ms-flex-align: start;\r\n align-items: flex-start;\r\n -ms-flex-pack: justify;\r\n justify-content: space-between;\r\n padding: 1rem 1rem;\r\n border-bottom: 1px solid #dee2e6;\r\n border-top-left-radius: calc(0.3rem
        Source: Reader_Install_Setup.exeString found in binary or memory: Rz26TjBddI4","align-self-md-start":"xTvlYZBtMd3hxVUw0G1S","align-self-md-end":"fZE3fFOWzrNpoqLg33AU","align-self-md-center":"R1In6pl7PW91BoY3krKQ","align-self-md-baseline":"J1mijNk_O5u2_BNY_hz0","align-self-md-stretch":"NAXMdJmeSI56lhqzCE60","flex-lg-row":"mj9
        Source: Reader_Install_Setup.exeString found in binary or memory: tvvlXn96uf7yGf1tR {\r\n -ms-flex-pack: start !important;\r\n justify-content: flex-start !important;\r\n }\r\n .PoT2qU4sMKBleURcc2cJ {\r\n -ms-flex-pack: end !important;\r\n justify-content: flex-end !important;\r\n }\r\n .AVIeQzlddzrtDxIBXkKd
        Source: Reader_Install_Setup.exeString found in binary or memory: Gw99NEZmcvYy","flex-lg-fill":"HKtXJhwNMeSoCd3MgKGQ","flex-lg-grow-0":"dvvTGp7Qb5VsoLexKoAj","flex-lg-grow-1":"MF9RSy7GVU0ZJs8Gio4O","flex-lg-shrink-0":"lPtuBlsAx25tEyrdPW0j","flex-lg-shrink-1":"smDQGRg_vRvZ1zTRxO2O","justify-content-lg-start":"hz1rXkTClh20Fh5L
        Source: Reader_Install_Setup.exeString found in binary or memory: T5h","justify-content-lg-end":"mXqDCUtaC_JMHMad0ZwV","justify-content-lg-center":"qOrqtkCp3ivHw7SVfILq","justify-content-lg-between":"LdfUwIH0FNecJPWWPrg1","justify-content-lg-around":"nVtckCgiojWEvbI_02td","align-items-lg-start":"SkBdZQ4j6W8eEExZe0hD","align-
        Source: Reader_Install_Setup.exeString found in binary or memory: lex-pack: distribute !important;\r\n justify-content: space-around !important;\r\n }\r\n .fJTv_QJTsr6EO2H1q4V3 {\r\n -ms-flex-align: start !important;\r\n align-items: flex-start !important;\r\n }\r\n .w8v8i3VE57doJW3WhKMD {\r\n -ms-flex-align:
        Source: Reader_Install_Setup.exeString found in binary or memory: tems-lg-end":"WAJbhUQHN23bq7qy5Sn4","align-items-lg-center":"kd6x9h_3ZymIzA4bgzN7","align-items-lg-baseline":"KO8aNPXTLKYLQxI6em9l","align-items-lg-stretch":"Km2Za0W8caH7Y94_8Cii","align-content-lg-start":"W43tG1Sz8VgKlzT3ABdI","align-content-lg-end":"jl0mwv_1
        Source: Reader_Install_Setup.exeString found in binary or memory: -self-lg-start":"G9A3tlQ35wA03mx2tzqx","align-self-lg-end":"eLScPzCVVKub71kFSTo6","align-self-lg-center":"AjPsmeBDtyK_yy_tIXdq","align-self-lg-baseline":"tEiZrAGTU4ltRxVsQYja","align-self-lg-stretch":"zM8DoQ0E3PzQ1e4NdlbO","flex-xl-row":"xiURbQvawKtv3lpRx8BS",
        Source: Reader_Install_Setup.exeString found in binary or memory: Y84ydtiU3il6ry9nY {\r\n -webkit-animation: none;\r\n animation: none;\r\n }\r\n}\r\n\r\n.W6C_Cm_0CSNW7ljg2Y9l {\r\n display: -ms-flexbox;\r\n display: flex;\r\n -ms-flex-align: start;\r\n align-items: flex-start;\r\n}\r\n\r\n.xyiYCq7vZX3AEsLK_h4t {\
        Source: Reader_Install_Setup.exeString found in binary or memory: t -installer is required but not provided." }, "ActionList_AlreadyExists": { "message": "Application already installed" }, "ActionList_Complete": { "message": "Installation complete" }, "ActionList_Cancelled": { "message": "Can
        Source: Reader_Install_Setup.exeString found in binary or memory: ());i.push([r.id,".h3prVibJIx6xMWozlLvS{\r\n display: flex;\r\n flex-direction: row;\r\n flex-wrap: nowrap;\r\n align-content: flex-end;\r\n justify-content: flex-start;\r\n align-items: flex-end;\r\n}",""]),i.locals={container:"h3prVibJIx6xM
        Source: Reader_Install_Setup.exeString found in binary or memory: -xl-fill":"kGKaQXNtKVolETkb6VY_","flex-xl-grow-0":"NeShcrAZ5y_hpxB1Krrg","flex-xl-grow-1":"ysC1kPY5k3OAcyOOrAZF","flex-xl-shrink-0":"c7DdFRyXaVXxSNLm96SA","flex-xl-shrink-1":"vVfhGb47ZI1vy9SKdLAy","justify-content-xl-start":"EMKOqdcLxlLCtgNKAVN9","justify-cont
        Source: Reader_Install_Setup.exeString found in binary or memory: nt-xl-end":"y9ejXHhttjAEgovYXYMU","justify-content-xl-center":"COPRSpy9kETB_SZQ4smx","justify-content-xl-between":"mYnlm8yqHdRJ8jWo0Ula","justify-content-xl-around":"SRf5p8hsCyhBY1KbbllG","align-items-xl-start":"AwPLyaWsRJ3kVfxTYAKZ","align-items-xl-end":"JLhQ
        Source: Reader_Install_Setup.exeString found in binary or memory: iYDHEA6tQXlGqaKw7jz {\r\n -ms-flex-item-align: start !important;\r\n align-self: flex-start !important;\r\n }\r\n .uq0dyk4fScobfEBVnATd {\r\n -ms-flex-item-align: end !important;\r\n align-self: flex-end !important;\r\n }\r\n .UpE4hJfsUm5TuZtTZ
        Source: Reader_Install_Setup.exeString found in binary or memory: J9YeJ2Xzm4rGI0o","align-items-xl-center":"TnX6CLfh8vo_Q_DeYU2g","align-items-xl-baseline":"VtD1JQ5GGSN55msvqOuH","align-items-xl-stretch":"r3SPzoMrEJe9HyIuwWCJ","align-content-xl-start":"kaIxRiZtzxK_YyZMBHo_","align-content-xl-end":"l1QG33TebFm8kJRTmnh7","alig
        Source: Reader_Install_Setup.exeString found in binary or memory: Congratulations": { "message": "Gratulerer!" }, "ActionList_Verify": { "message": "Verifiserer installasjon ..." }, "ActionList_ErrorUpdateMessage": { "message": "Kommandolinjeargumentet -installasjonsprogram kreves, men er ikke oppg
        Source: Reader_Install_Setup.exeString found in binary or memory: -content-xl-center":"MV4EN51PwhHoa9MTCThc","align-content-xl-between":"ch_UlL0T5dkZlpBCGf6z","align-content-xl-around":"qeeJg8mLhC36_AtZhgPi","align-content-xl-stretch":"VnQjhwHZwYkSNDH0IDLS","align-self-xl-auto":"f6I_MfERc6Cd5U2cvKdb","align-self-xl-start":"P
        Source: Reader_Install_Setup.exeString found in binary or memory: Adobe Acrobat" }, "Congratulations": { "message": "Onnittelut" }, "ActionList_Verify": { "message": "Tarkistetaan asennusta..." }, "ActionList_ErrorUpdateMessage": { "message": "Komentoriviargumentti -installer vaaditaan, mutt
        Source: Reader_Install_Setup.exeString found in binary or memory: -ms-flex-pack: start !important;\r\n justify-content: flex-start !important;\r\n }\r\n .eLk5KmeziN3FG_ZvWUbk {\r\n -ms-flex-pack: end !important;\r\n justify-content: flex-end !important;\r\n }\r\n .wx9l9CrohZahb5XLMrGW {\r\n -ms-flex-pack:
        Source: Reader_Install_Setup.exeString found in binary or memory: : "..." }, "ActionList_ErrorUpdateMessage": { "message": " -installer " }, "ActionList_AlreadyExists": { "message": "
        Source: Reader_Install_Setup.exeString found in binary or memory: mportant;\r\n justify-content: space-around !important;\r\n }\r\n .THpMIn_rv9gXJ1zTlRSw {\r\n -ms-flex-align: start !important;\r\n align-items: flex-start !important;\r\n }\r\n .GDHTGrjlGD0S0f1_DiJ5 {\r\n -ms-flex-align: end !important;\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: important;\r\n }\r\n .wekS_MR1HkGU6Ej1xqxk {\r\n -ms-flex-align: stretch !important;\r\n align-items: stretch !important;\r\n }\r\n .LkRjjQuLuuq2HISiPqJR {\r\n -ms-flex-line-pack: start !important;\r\n align-content: flex-start !important;\r\n
        Source: Reader_Install_Setup.exeString found in binary or memory: x-pack: start;\r\n justify-content: flex-start;\r\n }\r\n .bCwZiTNFMMbBWr3jcpcC .UdZ9h4yDyt7zzl_efcFz {\r\n -ms-flex-direction: row;\r\n flex-direction: row;\r\n }\r\n .bCwZiTNFMMbBWr3jcpcC .UdZ9h4yDyt7zzl_efcFz .WNvdx4uqUWtr9A7ET3s8 {\r\n posi
        Source: Reader_Install_Setup.exeString found in binary or memory: \n -ms-flex-item-align: start !important;\r\n align-self: flex-start !important;\r\n }\r\n .fZE3fFOWzrNpoqLg33AU {\r\n -ms-flex-item-align: end !important;\r\n align-self: flex-end !important;\r\n }\r\n .R1In6pl7PW91BoY3krKQ {\r\n -ms-flex-i
        Source: Reader_Install_Setup.exeString found in binary or memory: ft..." }, "ActionList_ErrorUpdateMessage": { "message": "Das Befehlszeilenargument -installer muss angegeben werden." }, "ActionList_AlreadyExists": { "message": "Die Anwendung ist bereits installiert." }, "ActionList_Comp
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Acrobat_DC_x64_VIP_v10.12.msi"
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe "C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe "rundll32.exe" "C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServer
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe "C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"Jump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe "rundll32.exe" "C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServerJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: oledlg.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: oleaccrc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: pgpmapih.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dxgidebug.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ieframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dataexchange.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: d3d11.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dcomp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dxgi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: twinapi.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msiso.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: mshtml.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: srpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: jscript9.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msxml3.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: msimtf.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: resourcepolicyclient.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: d2d1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dwrite.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: d3d10warp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dxcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: xmllite.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: uianimation.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{DD475EBC-D960-4AF4-BB8A-BE91FA942756}Jump to behavior
        Source: Acrobat_DC_x64_VIP_v10.12.msiStatic file information: File size 2834432 > 1048576
        Source: Binary string: C:\adm\jenkins\workspace\New_RDC_Sol_Plutus_Win_Build_git\2.0\dev\target\win\Release\Adobe Download Manager.pdb source: Reader_Install_Setup.exe, 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00F6F080 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00F6F080
        Source: Reader_Install_Setup.exe.1.drStatic PE information: real checksum: 0x16e9b1 should be: 0x165850
        Source: qpgEZsswIP.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x25b1c4
        Source: qpgEZsswIP.dll.1.drStatic PE information: section name: .rotext
        Source: qpgEZsswIP.dll.1.drStatic PE information: section name: .rodata
        Source: qpgEZsswIP.dll.1.drStatic PE information: section name: .rodata
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D05D5C push ecx; ret 2_2_00D05D6F
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D9A90C push es; iretd 2_2_00D9A9CC
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_075751EF pushad ; iretd 2_2_075751F2
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_094A63AB push cs; retf 2_2_094A63AF
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_094A83B0 push esi; ret 2_2_094A83B2
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_094A2EA5 push esp; iretd 2_2_094A2EAB
        Source: initial sampleStatic PE information: section name: UPX0
        Source: initial sampleStatic PE information: section name: UPX1
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dllJump to dropped file
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\rundll32.exeCode function: qemu qemu vmware vbox 3_2_0000022E65FF41F0
        Source: C:\Windows\System32\rundll32.exeCode function: vbox_req_val vbox_req_key vbox_files vbox_dirs vbox_check_mac vbox_devices vbox_window_class vbox_network_class vbox_process vbox_mac_wmi vbox_eventlog_wmi vbox_firmware_smbios vbox_firmware_acpi vbox_bus_wmi vbox_baseborad_wmi vbox_pnpentity_pcideviceid_wmi vbox_pnpentity_controllers_wmi vbox_pnpentity_vboxname_wmi vmware_reg_key_value vmware_reg_keys vmware_files vmware_dir vmware_mac vmware_adapter_name vmware_devices vmware_processes vmware_firmware_smbios vmware_firmware_ACPI qemu_reg_key_value qemu_reg_key_value qemu_processes qemu_processes qemu_dir qemu_dir qemu_firmware_acpi qemu_firmware_acpi qemu_firmware_smbios qemu_firmware_smbios 3_2_0000022E65FE7198
        Source: C:\Windows\System32\rundll32.exeCode function: vboxvideo VBoxVideoW8 VBoxWddm 3_2_0000022E65FF2160
        Source: C:\Windows\System32\rundll32.exeCode function: System32\drivers\VBoxMouse.sys System32\drivers\VBoxGuest.sys System32\drivers\VBoxSF.sys System32\drivers\VBoxVideo.sys System32\vboxdisp.dll System32\vboxhook.dll System32\vboxmrxnp.dll System32\vboxogl.dll System32\vboxoglarrayspu.dll System32\vboxoglcrutil.dll System32\vboxoglerrorspu.dll System32\vboxoglfeedbackspu.dll System32\vboxoglpackspu.dll System32\vboxoglpassthroughspu.dll System32\vboxservice.exe System32\vboxservice.exe System32\vboxtray.exe System32\VBoxControl.exe 3_2_0000022E65FF1D10
        Source: C:\Windows\System32\rundll32.exeCode function: VBOX VBOX VEN_VBOX 3_2_0000022E65FF2F00
        Source: C:\Windows\System32\rundll32.exeCode function: VBoxWddm VBoxSF VBoxMouse VBoxGuest 3_2_0000022E65FF4650
        Source: C:\Windows\System32\rundll32.exeCode function: vbox VBOX 3_2_0000022E65FF2470
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: rundll32.exeBinary or memory string: QEMU-GA.EXE
        Source: rundll32.exeBinary or memory string: VMUSRVC.EXE
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: 00:0C:29PV00:1C:14CHECKING MAC STARTING WITH %S00:50:56\\.\HGFSVMWAREVMTOOLSD.EXE\\.\VMCIVMWAREUSER.EXEVMWARETRAY.EXEVMACTHLP.EXEVGAUTHSERVICE.EXEVMWARECHECKING VWWARE PROCESS %S VMWAREVMSRVC.EXECHECKING VIRTUAL PC PROCESSES %S VMUSRVC.EXESOFTWARE\MICROSOFT\VIRTUAL MACHINE\GUEST\PARAMETERSQEMUVDAGENT.EXEQEMU-GA.EXECHECKING QEMU PROCESSES %S VDSERVICE.EXESPICE GUEST TOOLSQEMU-GAQEMUCHECKING QEMU DIRECTORY %S BOCHSQEMUBXPCSOFTWARE\WINEWINE_GET_UNIX_FILE_NAMESYSTEM\CONTROLSET001\SERVICES\VIOSTORSYSTEM\CONTROLSET001\SERVICES\VIOSCSISYSTEM\CONTROLSET001\SERVICES\VIRTIOSERIALSYSTEM\CONTROLSET001\SERVICES\VIRTIO-FS SERVICESYSTEM\CONTROLSET001\SERVICES\BALLOONSERVICESYSTEM\CONTROLSET001\SERVICES\BALLOONSYSTEM32\DRIVERS\BALLOON.SYSSYSTEM\CONTROLSET001\SERVICES\NETKVMSYSTEM32\DRIVERS\PVPANIC.SYSSYSTEM32\DRIVERS\NETKVM.SYSSYSTEM32\DRIVERS\VIOGPUDO.SYSSYSTEM32\DRIVERS\VIOFS.SYSSYSTEM32\DRIVERS\VIORNG.SYSSYSTEM32\DRIVERS\VIOINPUT.SYSSYSTEM32\DRIVERS\VIOSER.SYSSYSTEM32\DRIVERS\VIOSCSI.SYSVIRTIO-WIN\SYSTEM32\DRIVERS\VIOSTOR.SYSBOT.EXESAMPLE.EXEMALWARE.EXESANDBOX.EXEKLAVME.EXETEST.EXETESTAPP.EXEMYAPP.EXECHECKING IF PROCESS FILE NAME LOOKS LIKE A HASH: %S CHECKING IF PROCESS FILE NAME CONTAINS: %S SANDBOXCURRENTUSERHAPUBWSEMILYIT-ADMINHONG LEEMILLERJOHNSONPETER WILSONMILOZSSAND BOXTIMMYMALTESTMALWAREVIRUSTEST USERCHECKING IF USERNAME MATCHES : %S JOHN DOESIZESELECT * FROM WIN32_LOGICALDISKVBOXQEMUVMWAREVIRTUALSELECT * FROM WIN32_COMPUTERSYSTEMHVM DOMUMODELSELECT * FROM WIN32_FANXENVIRTIOVMWSYSTEM\CURRENTCONTROLSET\ENUM\IDEPROCEXP64.EXESYSTEM\CURRENTCONTROLSET\ENUM\SCSIDESKTOPPRL_TOOLS.EXEPRL_CC.EXE
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 4090000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 3620000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 4010000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 4390000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 7470000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 7510000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 7530000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8E50000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8EB0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8F50000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8FB0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9010000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9070000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 90D0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 90F0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9190000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 91D0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9220000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9240000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9260000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9340000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 93C0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9400000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 7450000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 88F0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8910000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8BD0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8BF0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 94A0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9520000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C10000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 9A30000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C30000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C50000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8ED0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8F90000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 7590000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8D30000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C70000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 94C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C90000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8C70000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: 8CB0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: F80000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: FA0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Windows\System32\rundll32.exeCode function: EnumServicesStatusExW,GetLastError,EnumServicesStatusExW,3_2_0000022E65FF4850
        Source: C:\Windows\System32\rundll32.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,3_2_0000022E65FF4CD0
        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dllJump to dropped file
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep count: 61 > 30Jump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep time: -122000s >= -30000sJump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep count: 85 > 30Jump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep time: -255000s >= -30000sJump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep count: 73 > 30Jump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep time: -146000s >= -30000sJump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep count: 76 > 30Jump to behavior
        Source: C:\Windows\System32\rundll32.exe TID: 7616Thread sleep time: -228000s >= -30000sJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D068EA VirtualQuery,GetSystemInfo,2_2_00D068EA
        Source: rundll32.exeBinary or memory string: VBoxGuest
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: VMware
        Source: rundll32.exeBinary or memory string: VBoxMouse
        Source: rundll32.exeBinary or memory string: Checking qemu processes %s
        Source: rundll32.exeBinary or memory string: vmmemctl
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: 00:0c:29PV00:1C:14Checking MAC starting with %s00:50:56\\.\HGFSVMWarevmtoolsd.exe\\.\vmcivmwareuser.exevmwaretray.exevmacthlp.exeVGAuthService.exeVMwareChecking VWware process %s VMWAREVMSrvc.exeChecking Virtual PC processes %s VMUSrvc.exeSOFTWARE\Microsoft\Virtual Machine\Guest\ParametersQEMUvdagent.exeqemu-ga.exeChecking qemu processes %s vdservice.exeSPICE Guest Toolsqemu-gaqemuChecking QEMU directory %s BOCHSQEMUBXPCSOFTWARE\Winewine_get_unix_file_nameSYSTEM\ControlSet001\Services\viostorSYSTEM\ControlSet001\Services\vioscsiSYSTEM\ControlSet001\Services\VirtioSerialSYSTEM\ControlSet001\Services\VirtIO-FS ServiceSYSTEM\ControlSet001\Services\BalloonServiceSYSTEM\ControlSet001\Services\BALLOONSystem32\drivers\balloon.sysSYSTEM\ControlSet001\Services\netkvmSystem32\drivers\pvpanic.sysSystem32\drivers\netkvm.sysSystem32\drivers\viogpudo.sysSystem32\drivers\viofs.sysSystem32\drivers\viorng.sysSystem32\drivers\vioinput.sysSystem32\drivers\vioser.sysSystem32\drivers\vioscsi.sysVirtio-Win\System32\drivers\viostor.sysbot.exesample.exemalware.exesandbox.exeklavme.exetest.exetestapp.exemyapp.exeChecking if process file name looks like a hash: %s Checking if process file name contains: %s SandboxCurrentUserHAPUBWSEmilyIT-ADMINHong LeeMillerJohnsonPeter Wilsonmilozssand boxtimmymaltestmalwarevirustest userChecking if username matches : %s John DoeSizeSELECT * FROM Win32_LogicalDiskvboxqemuvmwareVirtualSELECT * FROM Win32_ComputerSystemHVM domUModelSELECT * FROM Win32_FanxenvirtioVMWSystem\CurrentControlSet\Enum\IDEprocexp64.exeSystem\CurrentControlSet\Enum\SCSIDesktopprl_tools.exeprl_cc.exe
        Source: rundll32.exeBinary or memory string: System32\drivers\vmnetuserif.sys
        Source: rundll32.exe, 00000003.00000002.4170488563.0000022E64164000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rodu8971434D56-1548-ED3D-AEE6-C75AECD93BF0VMware, Inc.Noney
        Source: rundll32.exeBinary or memory string: qemu-ga.exe
        Source: rundll32.exeBinary or memory string: \\.\VBoxMiniRdrDN
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.0000000001505000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: rundll32.exeBinary or memory string: VBoxTrayToolWnd
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: VMWARE
        Source: rundll32.exeBinary or memory string: \\.\VBoxTrayIPC
        Source: rundll32.exeBinary or memory string: VBoxTrayToolWndClass
        Source: rundll32.exeBinary or memory string: System32\drivers\VBoxMouse.sys
        Source: rundll32.exeBinary or memory string: vmmouse
        Source: rundll32.exeBinary or memory string: VMUSrvc.exe
        Source: rundll32.exeBinary or memory string: \\.\HGFS
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_reg_keys
        Source: rundll32.exeBinary or memory string: vmwareuser.exe
        Source: rundll32.exeBinary or memory string: qemu-ga
        Source: rundll32.exeBinary or memory string: System32\drivers\VBoxGuest.sys
        Source: rundll32.exeBinary or memory string: vmware
        Source: rundll32.exeBinary or memory string: System32\drivers\vmmouse.sys
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_dir
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_devices
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_processes
        Source: rundll32.exeBinary or memory string: System32\vboxservice.exe
        Source: rundll32.exeBinary or memory string: \\.\VBoxGuest
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: qemu_reg_key_value
        Source: rundll32.exeBinary or memory string: vboxservice.exe
        Source: rundll32.exeBinary or memory string: System32\vboxtray.exe
        Source: rundll32.exeBinary or memory string: \\.\vmci
        Source: rundll32.exeBinary or memory string: HARDWARE\ACPI\FADT\VBOX__
        Source: rundll32.exeBinary or memory string: VMWare\
        Source: rundll32.exeBinary or memory string: System32\drivers\vmhgfs.sys
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_reg_key_value
        Source: rundll32.exeBinary or memory string: VBoxSF
        Source: rundll32.exeBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
        Source: rundll32.exeBinary or memory string: vboxtray.exe
        Source: rundll32.exeBinary or memory string: vmwaretray.exe
        Source: rundll32.exeBinary or memory string: System32\drivers\vmx86.sys
        Source: rundll32.exe, 00000003.00000002.4170488563.0000022E64132000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
        Source: rundll32.exeBinary or memory string: System32\drivers\vmnet.sys
        Source: rundll32.exe, 00000003.00000002.4170488563.0000022E64132000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stringComputer System ProductComputer System ProductG59S8971434D56-1548-ED3D-AEE6-C75AECD93BF0VMware, Inc.Noney*
        Source: rundll32.exeBinary or memory string: vmtoolsd.exe
        Source: rundll32.exeBinary or memory string: vmhgfs
        Source: Reader_Install_Setup.exe, 00000002.00000002.4171708465.0000000001505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs1?
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_adapter_name
        Source: rundll32.exeBinary or memory string: HARDWARE\ACPI\RSDT\VBOX__
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: '\\.\pipe\VBoxMiniRdDN\\.\VBoxGuest\\.\pipe\VBoxTrayIPC\\.\VBoxTrayIPCVBoxTrayToolWndClassChecking device %s VirtualBox Shared FoldersVBoxTrayToolWndvboxtray.exevboxservice.exeSELECT * FROM Win32_NetworkAdapterConfigurationChecking VirtualBox process %s 08:00:27MACAddressVBoxVideoW8vboxvideoSELECT * FROM Win32_NTEventlogFileVBoxWddmSystemFileNameVirtualBoxSourcesVBOXvboxDeviceIdSELECT * FROM Win32_PnPEntityNamePCI\VEN_80EE&DEV_CAFE82441FX82801FBOpenHCD82371SBACPIBus_BUS_0SELECT * FROM Win32_BusPNP_BUS_0PCI_BUS_0ProductSELECT * FROM Win32_BaseBoardManufacturerVirtualBoxSELECT * FROM Win32_PnPDeviceOracle CorporationPNPDeviceIDCaptionVEN_VBOXVMWAREHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0SystemManufacturerSYSTEM\ControlSet001\Control\SystemInformationChecking reg key %sSystemProductNameSystem32\drivers\vmnet.sysSOFTWARE\VMware, Inc.\VMware ToolsSystem32\drivers\vmusb.sysSystem32\drivers\vmmouse.sysSystem32\drivers\vmci.sysSystem32\drivers\vm3dmp.sysSystem32\drivers\vmmemctl.sysSystem32\drivers\vmhgfs.sysSystem32\drivers\vmrawdsk.sysSystem32\drivers\vmx86.sysSystem32\drivers\vmkdb.sysSystem32\drivers\vmusbmouse.sysSystem32\drivers\vmnetadapter.sysSystem32\drivers\vmnetuserif.sys
        Source: rundll32.exeBinary or memory string: \\.\pipe\VBoxTrayIPC
        Source: rundll32.exeBinary or memory string: System32\vboxhook.dll
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: qemu_processes
        Source: rundll32.exeBinary or memory string: System32\drivers\vmnetadapter.sys
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: qemu_dir
        Source: rundll32.exeBinary or memory string: System32\vboxmrxnp.dll
        Source: rundll32.exe, 00000003.00000002.4170488563.0000022E64127000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: rundll32.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: BChecking Parallels processes: %sVBoxMouseVBoxSFvmciVBoxGuestvmmousevmhgfsvmusbvmmemctlvmx_svgavmusbmousevmx86vmxnetFailed to get services list.
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_firmware_smbios
        Source: rundll32.exeBinary or memory string: System32\drivers\vmci.sys
        Source: rundll32.exeBinary or memory string: VMSrvc.exe
        Source: rundll32.exeBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: rundll32.exeBinary or memory string: vmx86
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_mac
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: qemu_firmware_acpi
        Source: rundll32.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxGuest
        Source: rundll32.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxService
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: iVMWare\
        Source: rundll32.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxMouse
        Source: rundll32.exeBinary or memory string: VMWare
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_files
        Source: rundll32.exeBinary or memory string: Checking QEMU directory %s
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: vmware_firmware_ACPI
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: ntdll.dllkernel32.dllLdrLoadDllLdrGetProcedureAddressZwProtectVirtualMemoryRtlAnsiStringToUnicodeStringRtlFreeUnicodeStringNtQueueApcThreadIsWow64ProcessLoadLibraryAZwQueryInformationProcessRtlNtStatusToDosErrorNtResumeProcessZwAllocateVirtualMemoryZwWriteVirtualMemoryZwReadVirtualMemoryZwGetContextThreadZwSetContextThreadNtMapViewOfSectionNtCreateSectionNtUnmapViewOfSectionZwCloseROOT\CIMV2CoSetProxyBlanketole32.dllWin32_ProcessCreateCommandLineWin32_ProcessStartupShowWindowCreateFlagsReturnValueProcessStartupInformationProcessIdSELECT * FROM Win32_ComputerSystemProductUUIDDomainSELECT * FROM Win32_ComputerSystem NameSELECT * FROM Win32_ComputerSystemCaptionSELECT * FROM Win32_OperatingSystem WQLIdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0HARDWARE\Description\SystemVBOXVideoBiosVersionSystemBiosVersionSystemBiosDateVIRTUALBOXChecking reg key HARDWARE\Description\System - %s is set to %s06/23/99HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\DSDT\VBOX__SOFTWARE\Oracle\VirtualBox Guest AdditionsHARDWARE\ACPI\RSDT\VBOX__SYSTEM\ControlSet001\Services\VBoxMouseSYSTEM\ControlSet001\Services\VBoxGuestSYSTEM\ControlSet001\Services\VBoxSFSYSTEM\ControlSet001\Services\VBoxServiceChecking reg key %s SYSTEM\ControlSet001\Services\VBoxVideoSystem32\drivers\VBoxGuest.sysSystem32\drivers\VBoxMouse.sysSystem32\drivers\VBoxVideo.sysSystem32\drivers\VBoxSF.sysSystem32\vboxhook.dllSystem32\vboxdisp.dllSystem32\vboxogl.dllSystem32\vboxmrxnp.dllSystem32\vboxoglcrutil.dllSystem32\vboxoglarrayspu.dllSystem32\vboxoglfeedbackspu.dllSystem32\vboxoglerrorspu.dllSystem32\vboxoglpassthroughspu.dllSystem32\vboxoglpackspu.dllSystem32\vboxtray.exeSystem32\vboxservice.exeChecking file %s System32\VBoxControl.exe%ProgramW6432%oracle\virtualbox guest additions\\\.\VBoxMiniRdrDN
        Source: rundll32.exeBinary or memory string: System32\drivers\VBoxSF.sys
        Source: rundll32.exeBinary or memory string: System32\drivers\vmmemctl.sys
        Source: rundll32.exe, rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: qemu_firmware_smbios
        Source: rundll32.exe, 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: client_idgroup_namesys_versionclient_versionsession_idiphashtask_statetask_idtask_resulttasksFORTHEEMPERORclient_pingclient_ipgeneralclient_typesessuuidusercheck_xenpsexp_runningwine_exportswine_reqvbox_req_valvbox_req_keyvbox_filesvbox_dirsvbox_check_macvbox_devicesvbox_window_classvbox_network_classvbox_processvbox_mac_wmivbox_eventlog_wmivbox_firmware_smbiosvbox_firmware_acpivbox_bus_wmivbox_baseborad_wmivbox_pnpentity_pcideviceid_wmivbox_pnpentity_controllers_wmivbox_pnpentity_vboxname_wmivmware_reg_key_valuevmware_reg_keysvmware_filesvmware_dirvmware_macvmware_adapter_namevmware_devicesvmware_processesvmware_firmware_smbiosvmware_firmware_ACPIvirtual_pc_processvirtual_pc_reg_keysvm_driver_servicescpu_fan_wmiqemu_reg_key_valueqemu_processesqemu_dirqemu_firmware_acpiqemu_firmware_smbioskvm_reg_keyskvm_fileskvm_dirparallels_processparallels_check_macmod_compdsksknown_umemsmsmvisfromdescknown_filesnum_of_procsreq_disk_enumproc_listbinary_db
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeAPI call chain: ExitProcess graph end nodegraph_2-23905
        Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D0D111 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D0D111
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00F6F080 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00F6F080
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D299BF mov eax, dword ptr fs:[00000030h]2_2_00D299BF
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D1C54C mov ecx, dword ptr fs:[00000030h]2_2_00D1C54C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEDCF0 GetProcessHeap,HeapAlloc,3_2_0000022E65FEDCF0
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe "C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D05895 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00D05895
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: 2_2_00D0D111 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D0D111
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E66115D8C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000022E66115D8C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E66143530 SetUnhandledExceptionFilter,3_2_0000022E66143530
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.155.37.158 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.83.20.213 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 46.249.38.179 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 149.154.153.2 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeNetwork Connect: 188.166.15.250 443Jump to behavior
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF4DE0 CreateToolhelp32Snapshot,Process32FirstW,StrCmpIW,CloseHandle,Process32NextW,StrCmpIW,Process32NextW,CloseHandle,3_2_0000022E65FF4DE0
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: EnumSystemLocalesW,2_2_00D27CD3
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,2_2_00D2EC98
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00D2E816
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,2_2_00D2E403
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,2_2_00D2E5FE
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00D2ED67
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: EnumSystemLocalesW,2_2_00D2E6F0
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,2_2_00D28290
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: EnumSystemLocalesW,2_2_00D2E6A5
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,2_2_00D2EA69
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00D2EB92
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeCode function: EnumSystemLocalesW,2_2_00D2E78B
        Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,3_2_0000022E6612D0C8
        Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_0000022E66131F78
        Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0000022E66131D90
        Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_0000022E6612CABC
        Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_0000022E66131898
        Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_0000022E66131968
        Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,3_2_0000022E661434F0
        Source: C:\Windows\System32\rundll32.exeCode function: TranslateName,TranslateName,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW,3_2_0000022E6613158C
        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FDB25C CreateNamedPipeA,_CxxThrowException,CreateFileA,_CxxThrowException,std::_Deallocate,3_2_0000022E65FDB25C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E660F42D8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_0000022E660F42D8
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FF3C10 GetUserNameW,3_2_0000022E65FF3C10
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEAA68 RpcServerUseProtseqEpA,RpcServerRegisterIfEx,RpcServerListen,std::_Deallocate,3_2_0000022E65FEAA68
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEA9F4 RpcBindingFree,3_2_0000022E65FEA9F4
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEA97C RpcBindingFree,3_2_0000022E65FEA97C
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEA908 RpcBindingFree,3_2_0000022E65FEA908
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEA894 RpcBindingFree,3_2_0000022E65FEA894
        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000022E65FEAB40 RpcMgmtStopServerListening,RpcServerUnregisterIf,3_2_0000022E65FEAB40
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure1
        Replication Through Removable Media
        1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Disable or Modify Tools
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        1
        Windows Service
        1
        Windows Service
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory11
        Peripheral Device Discovery
        Remote Desktop Protocol1
        Email Collection
        1
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)22
        Process Injection
        21
        Obfuscated Files or Information
        Security Account Manager1
        Account Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Software Packing
        NTDS1
        System Service Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        System Network Connections Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        File Deletion
        Cached Domain Credentials24
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Masquerading
        DCSync1
        Query Registry
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
        Virtualization/Sandbox Evasion
        Proc Filesystem321
        Security Software Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt22
        Process Injection
        /etc/passwd and /etc/shadow12
        Virtualization/Sandbox Evasion
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Rundll32
        Network Sniffing12
        Process Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Owner/User Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled TaskEmbedded PayloadsKeylogging1
        System Network Configuration Discovery
        Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Acrobat_DC_x64_VIP_v10.12.msi5%ReversingLabsBinary.Trojan.BumbleBee
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe5%ReversingLabs
        C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll13%ReversingLabsWin64.Trojan.BumbleBee
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        l1whn6jhl8xi.live0%Avira URL Cloudsafe
        9nrkgb5ymmhx.live0%Avira URL Cloudsafe
        8vxea0tldluf.live0%Avira URL Cloudsafe
        aho8skpvfpxw.live0%Avira URL Cloudsafe
        9gle7ejwpees.live0%Avira URL Cloudsafe
        a0xjyxk6h5m7.live0%Avira URL Cloudsafe
        0xejepvnnpze.live0%Avira URL Cloudsafe
        velmddsj68vd.live0%Avira URL Cloudsafe
        kwekpaz4eobt.live0%Avira URL Cloudsafe
        kaky1v99z650.live0%Avira URL Cloudsafe
        iaqxv2w3o0xc.live0%Avira URL Cloudsafe
        ei2svhuxkfnm.live0%Avira URL Cloudsafe
        164kx6yftp7e.live0%Avira URL Cloudsafe
        437jwomut9vr.live0%Avira URL Cloudsafe
        tok60x6gccij.live0%Avira URL Cloudsafe
        uzpp0a72mgf8.live0%Avira URL Cloudsafe
        541xdsl3qrmo.live0%Avira URL Cloudsafe
        vh378qqwk9vc.live0%Avira URL Cloudsafe
        vmduug7itjpc.live0%Avira URL Cloudsafe
        nvzd7pgfgpxt.live0%Avira URL Cloudsafe
        ipmh0eee13h2.live0%Avira URL Cloudsafe
        t6ocigyxberq.live0%Avira URL Cloudsafe
        a1xbi34msajq.live0%Avira URL Cloudsafe
        sztn5z9mczvv.live0%Avira URL Cloudsafe
        w2pjbfv1lp0s.live0%Avira URL Cloudsafe
        vlqwx3ydmtxh.live0%Avira URL Cloudsafe
        forned95q3gl.live0%Avira URL Cloudsafe
        oltfqksrbe1h.live0%Avira URL Cloudsafe
        13gdw8hd0f5g.live0%Avira URL Cloudsafe
        twh0pzti1jmc.live0%Avira URL Cloudsafe
        w525f7mmd4ms.live0%Avira URL Cloudsafe
        n3om81law5m7.live0%Avira URL Cloudsafe
        77mk5fucuhe8.live0%Avira URL Cloudsafe
        hlhhny6jyz0h.live0%Avira URL Cloudsafe
        ya8ym63w9m91.live0%Avira URL Cloudsafe
        lfi8tslls020.live0%Avira URL Cloudsafe
        nsqum7l04ak6.live0%Avira URL Cloudsafe
        aa8btew33mma.live0%Avira URL Cloudsafe
        y7bc5b0ezh5m.live0%Avira URL Cloudsafe
        eldzk3tkcta3.live0%Avira URL Cloudsafe
        vt762jefdhwk.live0%Avira URL Cloudsafe
        h8laq4jtyfqp.live0%Avira URL Cloudsafe
        4p06saxn3ubp.live0%Avira URL Cloudsafe
        7hxcfu85ux0c.live0%Avira URL Cloudsafe
        26wem2p2aunb.live0%Avira URL Cloudsafe
        0gylcs3gwdpp.live0%Avira URL Cloudsafe
        s542jqly9hk1.live0%Avira URL Cloudsafe
        ejz7h2nwpe9p.live0%Avira URL Cloudsafe
        ppakbng3anmz.live0%Avira URL Cloudsafe
        va5rnvsffage.live0%Avira URL Cloudsafe
        3ysjrezb3os9.live0%Avira URL Cloudsafe
        i5ke68h24a00.live0%Avira URL Cloudsafe
        mmerhgt2a428.live0%Avira URL Cloudsafe
        aummhmvbuvf7.live0%Avira URL Cloudsafe
        r33j2bx1ieh9.live0%Avira URL Cloudsafe
        x39w37ihaw67.live0%Avira URL Cloudsafe
        u86t183m8fjl.live0%Avira URL Cloudsafe
        exe12ldlj0nb.live0%Avira URL Cloudsafe
        rzctrohkd26r.live0%Avira URL Cloudsafe
        q8txsh5ger29.live0%Avira URL Cloudsafe
        adu5tcdt1mw8.live0%Avira URL Cloudsafe
        toooegs0ua4k.live0%Avira URL Cloudsafe
        2ujyrqt4xzmp.live0%Avira URL Cloudsafe
        rigwjjv5e0te.live0%Avira URL Cloudsafe
        0ws4d9s611dt.live0%Avira URL Cloudsafe
        9yvk5z9213sf.live0%Avira URL Cloudsafe
        9nsdtl72ktuk.live0%Avira URL Cloudsafe
        pdim2swkrf2v.live0%Avira URL Cloudsafe
        xj0airqray7d.live0%Avira URL Cloudsafe
        4vh1mae0a37r.live0%Avira URL Cloudsafe
        orp3efts3f5z.live0%Avira URL Cloudsafe
        qxul3spnx991.live0%Avira URL Cloudsafe
        kiph911rpr6p.live0%Avira URL Cloudsafe
        r4og0ibkr2i1.live0%Avira URL Cloudsafe
        271bk6bm6ek7.live0%Avira URL Cloudsafe
        5aphqp78vw8h.live0%Avira URL Cloudsafe
        nketun9udno5.live0%Avira URL Cloudsafe
        mak2p2u1p6oc.live0%Avira URL Cloudsafe
        6mca3un8fmrd.live0%Avira URL Cloudsafe
        w3d73cw4ayun.live0%Avira URL Cloudsafe
        6lgie8q5pjdc.live0%Avira URL Cloudsafe
        ufiiux335dpw.live0%Avira URL Cloudsafe
        egdk83k09qmr.live0%Avira URL Cloudsafe
        z7w1125qgaak.live0%Avira URL Cloudsafe
        zd6j8je6phb4.live0%Avira URL Cloudsafe
        u1uaoomqywpz.live0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        9nrkgb5ymmhx.livetrue
        • Avira URL Cloud: safe
        unknown
        8vxea0tldluf.livetrue
        • Avira URL Cloud: safe
        unknown
        velmddsj68vd.livetrue
        • Avira URL Cloud: safe
        unknown
        0xejepvnnpze.livetrue
        • Avira URL Cloud: safe
        unknown
        aho8skpvfpxw.livetrue
        • Avira URL Cloud: safe
        unknown
        9gle7ejwpees.livetrue
        • Avira URL Cloud: safe
        unknown
        a0xjyxk6h5m7.livetrue
        • Avira URL Cloud: safe
        unknown
        l1whn6jhl8xi.livetrue
        • Avira URL Cloud: safe
        unknown
        kwekpaz4eobt.livetrue
        • Avira URL Cloud: safe
        unknown
        kaky1v99z650.livetrue
        • Avira URL Cloud: safe
        unknown
        iaqxv2w3o0xc.livetrue
        • Avira URL Cloud: safe
        unknown
        ei2svhuxkfnm.livetrue
        • Avira URL Cloud: safe
        unknown
        164kx6yftp7e.livetrue
        • Avira URL Cloud: safe
        unknown
        tok60x6gccij.livetrue
        • Avira URL Cloud: safe
        unknown
        437jwomut9vr.livetrue
        • Avira URL Cloud: safe
        unknown
        vh378qqwk9vc.livetrue
        • Avira URL Cloud: safe
        unknown
        uzpp0a72mgf8.livetrue
        • Avira URL Cloud: safe
        unknown
        541xdsl3qrmo.livetrue
        • Avira URL Cloud: safe
        unknown
        nvzd7pgfgpxt.livetrue
        • Avira URL Cloud: safe
        unknown
        vmduug7itjpc.livetrue
        • Avira URL Cloud: safe
        unknown
        ipmh0eee13h2.livetrue
        • Avira URL Cloud: safe
        unknown
        a1xbi34msajq.livetrue
        • Avira URL Cloud: safe
        unknown
        t6ocigyxberq.livetrue
        • Avira URL Cloud: safe
        unknown
        sztn5z9mczvv.livetrue
        • Avira URL Cloud: safe
        unknown
        w2pjbfv1lp0s.livetrue
        • Avira URL Cloud: safe
        unknown
        vlqwx3ydmtxh.livetrue
        • Avira URL Cloud: safe
        unknown
        forned95q3gl.livetrue
        • Avira URL Cloud: safe
        unknown
        oltfqksrbe1h.livetrue
        • Avira URL Cloud: safe
        unknown
        w525f7mmd4ms.livetrue
        • Avira URL Cloud: safe
        unknown
        13gdw8hd0f5g.livetrue
        • Avira URL Cloud: safe
        unknown
        77mk5fucuhe8.livetrue
        • Avira URL Cloud: safe
        unknown
        twh0pzti1jmc.livetrue
        • Avira URL Cloud: safe
        unknown
        n3om81law5m7.livetrue
        • Avira URL Cloud: safe
        unknown
        hlhhny6jyz0h.livetrue
        • Avira URL Cloud: safe
        unknown
        lfi8tslls020.livetrue
        • Avira URL Cloud: safe
        unknown
        ya8ym63w9m91.livetrue
        • Avira URL Cloud: safe
        unknown
        nsqum7l04ak6.livetrue
        • Avira URL Cloud: safe
        unknown
        aa8btew33mma.livetrue
        • Avira URL Cloud: safe
        unknown
        vt762jefdhwk.livetrue
        • Avira URL Cloud: safe
        unknown
        y7bc5b0ezh5m.livetrue
        • Avira URL Cloud: safe
        unknown
        h8laq4jtyfqp.livetrue
        • Avira URL Cloud: safe
        unknown
        4p06saxn3ubp.livetrue
        • Avira URL Cloud: safe
        unknown
        eldzk3tkcta3.livetrue
        • Avira URL Cloud: safe
        unknown
        7hxcfu85ux0c.livetrue
        • Avira URL Cloud: safe
        unknown
        26wem2p2aunb.livetrue
        • Avira URL Cloud: safe
        unknown
        s542jqly9hk1.livetrue
        • Avira URL Cloud: safe
        unknown
        0gylcs3gwdpp.livetrue
        • Avira URL Cloud: safe
        unknown
        ppakbng3anmz.livetrue
        • Avira URL Cloud: safe
        unknown
        ejz7h2nwpe9p.livetrue
        • Avira URL Cloud: safe
        unknown
        va5rnvsffage.livetrue
        • Avira URL Cloud: safe
        unknown
        r33j2bx1ieh9.livetrue
        • Avira URL Cloud: safe
        unknown
        i5ke68h24a00.livetrue
        • Avira URL Cloud: safe
        unknown
        aummhmvbuvf7.livetrue
        • Avira URL Cloud: safe
        unknown
        3ysjrezb3os9.livetrue
        • Avira URL Cloud: safe
        unknown
        mmerhgt2a428.livetrue
        • Avira URL Cloud: safe
        unknown
        u86t183m8fjl.livetrue
        • Avira URL Cloud: safe
        unknown
        exe12ldlj0nb.livetrue
        • Avira URL Cloud: safe
        unknown
        x39w37ihaw67.livetrue
        • Avira URL Cloud: safe
        unknown
        rzctrohkd26r.livetrue
        • Avira URL Cloud: safe
        unknown
        adu5tcdt1mw8.livetrue
        • Avira URL Cloud: safe
        unknown
        q8txsh5ger29.livetrue
        • Avira URL Cloud: safe
        unknown
        2ujyrqt4xzmp.livetrue
        • Avira URL Cloud: safe
        unknown
        toooegs0ua4k.livetrue
        • Avira URL Cloud: safe
        unknown
        rigwjjv5e0te.livetrue
        • Avira URL Cloud: safe
        unknown
        9yvk5z9213sf.livetrue
        • Avira URL Cloud: safe
        unknown
        0ws4d9s611dt.livetrue
        • Avira URL Cloud: safe
        unknown
        9nsdtl72ktuk.livetrue
        • Avira URL Cloud: safe
        unknown
        pdim2swkrf2v.livetrue
        • Avira URL Cloud: safe
        unknown
        orp3efts3f5z.livetrue
        • Avira URL Cloud: safe
        unknown
        xj0airqray7d.livetrue
        • Avira URL Cloud: safe
        unknown
        qxul3spnx991.livetrue
        • Avira URL Cloud: safe
        unknown
        4vh1mae0a37r.livetrue
        • Avira URL Cloud: safe
        unknown
        5aphqp78vw8h.livetrue
        • Avira URL Cloud: safe
        unknown
        r4og0ibkr2i1.livetrue
        • Avira URL Cloud: safe
        unknown
        kiph911rpr6p.livetrue
        • Avira URL Cloud: safe
        unknown
        271bk6bm6ek7.livetrue
        • Avira URL Cloud: safe
        unknown
        nketun9udno5.livetrue
        • Avira URL Cloud: safe
        unknown
        6mca3un8fmrd.livetrue
        • Avira URL Cloud: safe
        unknown
        mak2p2u1p6oc.livetrue
        • Avira URL Cloud: safe
        unknown
        w3d73cw4ayun.livetrue
        • Avira URL Cloud: safe
        unknown
        ufiiux335dpw.livetrue
        • Avira URL Cloud: safe
        unknown
        egdk83k09qmr.livetrue
        • Avira URL Cloud: safe
        unknown
        6lgie8q5pjdc.livetrue
        • Avira URL Cloud: safe
        unknown
        z7w1125qgaak.livetrue
        • Avira URL Cloud: safe
        unknown
        zd6j8je6phb4.livetrue
        • Avira URL Cloud: safe
        unknown
        u1uaoomqywpz.livetrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://use.typekit.net/af/a2527e/000000000000000000017704/27/l?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://use.typekit.net/af/4b3e87/000000000000000000017706/27/d?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://use.typekit.net/bxf0ivf.jsn.typeReader_Install_Setup.exe, 00000002.00000003.1749261059.00000000089FB000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://use.typekit.net/uTReader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://use.typekit.net/af/4b3e87/000000000000000000017706/27/a?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://use.typekit.net/af/40207f/0000000000000000000176ff/27/a?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://use.typekit.net/bxf0ivf.js020Reader_Install_Setup.exe, 00000002.00000002.4171708465.00000000014B4000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://use.typekit.net/af/74ffb1/000000000000000000017702/27/Reader_Install_Setup.exe, 00000002.00000002.4177607787.00000000074B1000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drfalse
                        high
                        https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4171708465.000000000151E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://use.typekit.net/af/40207f/0000000000000000000176ff/27/l?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://use.typekit.net/af/4b3e87/000000000000000000017706/27/l?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://use.typekit.net/af/a2527e/000000000000000000017704/27/d?primer=0635fba006f1437d962ae878ad04aReader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4178433184.0000000007749000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://reactjs.org/link/react-polyfillsReader_Install_Setup.exe, Reader_Install_Setup.exe, 00000002.00000002.4183756273.00000000093F0000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000003.1749261059.00000000089FB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://typekit.com/eulas/0000000000000000000176ffReader_Install_Setup.exe, 00000002.00000002.4178286591.0000000007642000.00000004.00000020.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4185510324.000000000A452000.00000004.00000800.00020000.00000000.sdmp, Reader_Install_Setup.exe, 00000002.00000002.4176100272.00000000048A1000.00000004.00000020.00020000.00000000.sdmp, bxf0ivf[1].js.2.drfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.153.2
                                    unknownEuropean Union
                                    57169EDIS-AS-EUATtrue
                                    45.155.37.158
                                    unknownNetherlands
                                    395092SHOCK-1UStrue
                                    188.166.15.250
                                    unknownNetherlands
                                    14061DIGITALOCEAN-ASNUStrue
                                    45.83.20.213
                                    unknownLatvia
                                    35913DEDIPATH-LLCUStrue
                                    46.249.38.179
                                    unknownNetherlands
                                    57043HOSTKEY-ASNLtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1560658
                                    Start date and time:2024-11-22 05:02:13 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 26s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Acrobat_DC_x64_VIP_v10.12.msi
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winMSI@6/73@0/5
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .msi
                                    • Override analysis time to 240s for rundll32
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.32.238.192, 23.32.238.210, 2.20.174.133, 23.32.238.235, 23.32.238.211, 192.168.2.4, 3.248.26.100, 54.77.72.255, 54.74.179.44, 23.218.208.137
                                    • Excluded domains from analysis (whitelisted): rdc.adobe.io, e4578.dscg.akamaiedge.net, fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, a1874.dscg1.akamai.net, fe3cr.delivery.mp.microsoft.com, p.typekit.net-stls-v3.edgesuite.net, ocsp.digicert.com, use-stls.adobe.com.edgesuite.net, ssl-delivery.adobe.com.edgekey.net, geo-dc.adobe.com, dlmping2.adobe.com, a1988.dscg1.akamai.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: Acrobat_DC_x64_VIP_v10.12.msi
                                    TimeTypeDescription
                                    23:04:00API Interceptor285x Sleep call for process: rundll32.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    188.166.15.250GkyZlYczv9.dllGet hashmaliciousBumbleBeeBrowse
                                      ZRemI0ixC6.dllGet hashmaliciousBumbleBeeBrowse
                                        PWzQpJQHzb.msiGet hashmaliciousUnknownBrowse
                                          Q6yuW8YIMR.dllGet hashmaliciousBumbleBeeBrowse
                                            7rbJdaTZe2.dllGet hashmaliciousBumbleBeeBrowse
                                              1JYlOOKImO.dllGet hashmaliciousBumbleBeeBrowse
                                                bGvIeUxVdy.msiGet hashmaliciousUnknownBrowse
                                                  QsLhL1pw3t.msiGet hashmaliciousUnknownBrowse
                                                    zoHnNvuTkk.dllGet hashmaliciousBumbleBeeBrowse
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      EDIS-AS-EUATotis.exeGet hashmaliciousUnknownBrowse
                                                      • 192.121.170.106
                                                      ssowoface.dllGet hashmaliciousUnknownBrowse
                                                      • 192.36.61.122
                                                      ssowoface.dllGet hashmaliciousUnknownBrowse
                                                      • 192.36.61.122
                                                      msws.msiGet hashmaliciousORPCBackdoorBrowse
                                                      • 151.236.9.174
                                                      msws.msiGet hashmaliciousORPCBackdoorBrowse
                                                      • 151.236.9.174
                                                      Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                      • 192.36.38.33
                                                      987123.exeGet hashmaliciousLummaC, Eternity Stealer, LummaC Stealer, SmokeLoader, Stealc, zgRATBrowse
                                                      • 192.36.38.33
                                                      16GAuqLUFK.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, StealcBrowse
                                                      • 192.36.38.33
                                                      NBHEkIKDCr.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                                      • 192.36.38.33
                                                      file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                      • 192.36.38.33
                                                      SHOCK-1USGkyZlYczv9.dllGet hashmaliciousBumbleBeeBrowse
                                                      • 144.208.127.113
                                                      1ZhE3yY8rV.ps1Get hashmaliciousUnknownBrowse
                                                      • 217.195.153.196
                                                      sd2.ps1Get hashmaliciousAgentTesla, KoiLoaderBrowse
                                                      • 217.195.153.196
                                                      ZRemI0ixC6.dllGet hashmaliciousBumbleBeeBrowse
                                                      • 144.208.127.113
                                                      PWzQpJQHzb.msiGet hashmaliciousUnknownBrowse
                                                      • 144.208.127.113
                                                      Q6yuW8YIMR.dllGet hashmaliciousBumbleBeeBrowse
                                                      • 144.208.127.113
                                                      7rbJdaTZe2.dllGet hashmaliciousBumbleBeeBrowse
                                                      • 144.208.127.113
                                                      1JYlOOKImO.dllGet hashmaliciousBumbleBeeBrowse
                                                      • 144.208.127.113
                                                      bGvIeUxVdy.msiGet hashmaliciousUnknownBrowse
                                                      • 144.208.127.113
                                                      QsLhL1pw3t.msiGet hashmaliciousUnknownBrowse
                                                      • 144.208.127.113
                                                      DEDIPATH-LLCUSKellyb Timesheet Report.pdfGet hashmaliciousHTMLPhisherBrowse
                                                      • 185.156.109.33
                                                      https://drive.google.com/file/d/11kk4glvCJRDeJ3XhdemRR_FFW8tGlSei/view?usp=sharing_eip&ts=67364a0bGet hashmaliciousUnknownBrowse
                                                      • 103.114.163.132
                                                      x86.elfGet hashmaliciousUnknownBrowse
                                                      • 45.149.222.146
                                                      bin.sh.elfGet hashmaliciousMiraiBrowse
                                                      • 185.243.57.145
                                                      nuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 193.43.68.31
                                                      la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                      • 38.143.204.166
                                                      nabarm5.elfGet hashmaliciousUnknownBrowse
                                                      • 161.8.2.27
                                                      bin.armv7l.elfGet hashmaliciousMiraiBrowse
                                                      • 84.245.34.238
                                                      12Vjq7Yv2E.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 45.89.110.133
                                                      7WyBcig6e3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 45.89.110.133
                                                      DIGITALOCEAN-ASNUShttp://www.tqltrax.comGet hashmaliciousUnknownBrowse
                                                      • 206.189.225.178
                                                      https://cabinetstogollc-my.sharepoint.com/:b:/g/personal/store802_cabinetstogo_com/EYepBlB4QExJsG0U-4jKG4ABoZxLg7rdp0_zjjwabbUc1g?e=q4iRIE&com.microsoft.intune.mam.appmdmmgtstate=2&com.microsoft.intune.mam.policysource=2&com.microsoft.intune.mam.identity=mcle%40novozymes.com&com.microsoft.intune.mam.policy=1&com.microGet hashmaliciousUnknownBrowse
                                                      • 188.166.2.160
                                                      NEW ORDER- 4788467.exeGet hashmaliciousRemcosBrowse
                                                      • 206.189.218.238
                                                      mipsel.elfGet hashmaliciousGafgytBrowse
                                                      • 139.59.211.214
                                                      https://msf-update.cloud/?rid=wDbmX0hGet hashmaliciousUnknownBrowse
                                                      • 162.243.5.136
                                                      https://floreslaherradura.com/?uid=a2FuZGVyc29uQGJxbGF3LmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                      • 167.71.91.68
                                                      https://pub-a652f10bc7cf485fb3baac4a6358c931.r2.dev/dreyflex.htmlGet hashmaliciousGabagoolBrowse
                                                      • 164.90.149.168
                                                      mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 161.35.223.150
                                                      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 95.85.30.215
                                                      dlr.arm7.elfGet hashmaliciousUnknownBrowse
                                                      • 138.197.188.56
                                                      No context
                                                      No context
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:modified
                                                      Size (bytes):8308
                                                      Entropy (8bit):5.625426500002003
                                                      Encrypted:false
                                                      SSDEEP:96:2mrqJeJEtpH8Zei2kaUgTCsTl0UgTCk3XaTlY682KsKwJAzRCrACLp64wIS5bGez:Pr0Y68ZeYtgOIhgOXiTILpY
                                                      MD5:867CF235EAD949A46ED7212D21777E53
                                                      SHA1:B117CF970285449CD5524952AB37151DB510B0F1
                                                      SHA-256:248D1EF1C1420BB9D7E494276C09BCD6A2FEFEB6DC2C783A8DDB36F96F6CD1F2
                                                      SHA-512:01F56139DFA564D8579AE82CB664C10B243D2E406246FB6A6B17C37119FA28A717583A2D0275CDF27B4A9B023E3965F42440B65784B4DFDF2A7DAE41807268B0
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...@IXOS.@.....@d.uY.@.....@.....@.....@.....@.....@......&.{DD475EBC-D960-4AF4-BB8A-BE91FA942756}..FWojXRpxua..Acrobat_DC_x64_VIP_v10.12.msi.@.....@.....@.....@........&.{73232F59-F6AA-4764-AEA4-731717E1ED5E}.....@.....@.....@.....@.......@.....@.....@.......@......FWojXRpxua......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{CA18E5D1-6D13-4F6E-8DAC-FB15EF2DFD0D}&.{DD475EBC-D960-4AF4-BB8A-BE91FA942756}.@......&.{55196117-3D71-4100-B339-6770670A36D9}&.{DD475EBC-D960-4AF4-BB8A-BE91FA942756}.@......&.{55196117-3D71-4100-B339-6770670A36D9}&.{00000000-0000-0000-0000-000000000000}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..;.C:\Users\user\AppData\Local\Temp\Package Installation Dir\....S.C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe....I.C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll....Reg
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):2653
                                                      Entropy (8bit):7.647120494009284
                                                      Encrypted:false
                                                      SSDEEP:48:/ccNn2VsrJ3+obhE82UlsP0PFNc7LUZEKlax2rLbbjQDQxm5DVD0UHe:0k2qgafLmIcLaE+acrnQMgFb+
                                                      MD5:ECD545FC4A0E81B5BC0076FC34D49B7A
                                                      SHA1:79C27CFC7054FF4C52D428E63CF91264984FDD89
                                                      SHA-256:B733F9351938AD36C8E733639F581F4BBD70840874E6EF05101F8E1D8CCDBD7F
                                                      SHA-512:EBC6AD8FC54CD5E6EF2143F73D23EED39E23A43007BF3BAEF828F35578836E6F5F859F74B234F667B65F58568FEA817AF124204F746AEEB006BDF396183626D0
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:.PNG........IHDR...(...(........m....tEXtSoftware.Adobe ImageReadyq.e<...(iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)" xmpMM:InstanceID="xmp.iid:BA558B0B5D6B11E48A78D1F371D518A4" xmpMM:DocumentID="xmp.did:BA558B0C5D6B11E48A78D1F371D518A4"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:BA558B095D6B11E48A78D1F371D518A4" stRef:documentID="xmp.did:BA558B0A5D6B11E48A78D1F371D518A4"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx..ml.E..g...IS>T...q.. ..Z..!.hU.F".@ML!1&4....o....!1|..p...[%D..F..".....Z..'hR...........]{o...
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 442 x 62, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1747
                                                      Entropy (8bit):7.063636331533908
                                                      Encrypted:false
                                                      SSDEEP:48:4ccvnLEVY0J30MTfY+Nw2CeaEskLNnthkpJp9NSk/:vMUYj+ftNwTGHLNntYvUw
                                                      MD5:E7D16937762F83E1A274AF5C87466DDE
                                                      SHA1:1CEF0A62593619A01B0A35AB353AA9F3336B81EB
                                                      SHA-256:12F303172CD2382BEF4B057233E5E4782EA8E20C979778BB8264AAB458E02B7B
                                                      SHA-512:65070D08BA253905BE0B1B95C9BF196B4CF71BFACE102FC384CCE50527F546D29992C4087E124623F8D043877E78C8FBA4B4718C9FB9AFBC55D0F55E53956E53
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:.PNG........IHDR.......>.....].......tEXtSoftware.Adobe ImageReadyq.e<...piTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:868482c0-3e81-4d13-b7d0-967d56927215" xmpMM:DocumentID="xmp.did:91F9D87F562B11E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:91F9D87E562B11E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:CD78A1A450BD11E4B9B2B51D48DF50D6" stRef:documentID="xmp.did:CD78A1A550BD11E4B9B2B51D48DF50D6"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>H79.....IDATx...1K.Q.....`$.......@.$t...E
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 13 x 13, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1290
                                                      Entropy (8bit):6.799771034908577
                                                      Encrypted:false
                                                      SSDEEP:24:p1hepWwjx82lY2T3UVgWDyJ3VaQG8bqZGl3C2LcAQ3jOMFt:3ccNn2QT+J3jWQ3twim
                                                      MD5:5853F412D28F0CAA8704AA92267398DD
                                                      SHA1:22E0E555BD039F5752E27E195EE5B162E84559BA
                                                      SHA-256:FA043DF1591ED69DACB50CBCD5D38E3EC30B493636CD5F23C38290371BC037D4
                                                      SHA-512:2C27C6454A80662886419070E2228D001B6650A5826CFE2BE8865036563DE425C6CB174F69E668A47A36588176A7E1890B409D7F91B7A04AD4C0C215A6B746E0
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:.PNG........IHDR.............r..|....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 Macintosh" xmpMM:InstanceID="xmp.iid:DBDE1574953611E495AEF9EA3C1F0781" xmpMM:DocumentID="xmp.did:DBDE1575953611E495AEF9EA3C1F0781"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:C04B797F953311E495AEF9EA3C1F0781" stRef:documentID="xmp.did:C04B7980953311E495AEF9EA3C1F0781"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..c`...zIDATx.LR;K.A....(..X...&.`..B.D+I....X(.?H.........G Z....m.!MB...F.vo.vo.........sLJIV&....*...K..x.\..1
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 469 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):15306
                                                      Entropy (8bit):1.8694156803319382
                                                      Encrypted:false
                                                      SSDEEP:48:l/6DeilYk29WJsEvkHYal+03r8L5o2k242NxN+Y97sc5ey7HbZdRaDN:lSyoYkEWmFmPDNxNX7sc51HfRaDN
                                                      MD5:BB94A177F10BF764D11F94D24A5DB5AA
                                                      SHA1:6864B58952B19248F4C5EA5C8764C52E207268A7
                                                      SHA-256:CAAFEA31074BA909EC57C9DCDD1B1C0256E5626939CC768B8A041FE42762E230
                                                      SHA-512:D2875EB5AD9FF76FF233ADA04FA77AECDBB0C9A80BCD85B0C50087786B47E97FEEC189D18164E15784CD96850849EE4E1920D7D98157CA7AD317BA03E8C66111
                                                      Malicious:false
                                                      Preview:.PNG........IHDR..............&t.....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:OriginalDocumentID>xmp.did:d310b992-d270-4e81-a192-9dd67f063430</xmpMM:OriginalDocumentID>. <xmpMM:DocumentID>xmp.did:9B19ACF050A311
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 586 x 26, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3364
                                                      Entropy (8bit):7.87299365047781
                                                      Encrypted:false
                                                      SSDEEP:48:3/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODRdX/eV0C/:3SDZ/I09Da01l+gmkyTt6Hk8nTr00o
                                                      MD5:5E3F8861E897F1D865A1DCA095AFB15A
                                                      SHA1:39FB6435750370FCF30AFDCEABC840947FCA17A3
                                                      SHA-256:A2C424618DE66C97F91833FE2EDB4BB05E03561E60AC40405771D2DEBB8CCB41
                                                      SHA-512:17F65092D4D98A88D858E1141859773FFD6978E513E0DB728C41AAE1C67436E702CE8D1EFCE04E99DDEEF40CD67E9241AF25856A6F02759C24C1F906AB4F31EC
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...J.........H2sG....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 704 x 32, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3562
                                                      Entropy (8bit):7.868968527311014
                                                      Encrypted:false
                                                      SSDEEP:96:RSDZ/I09Da01l+gmkyTt6Hk8nTOYxLGxcVzPIJ:RSDS0tKg9E05TOGLGxcVzPIJ
                                                      MD5:A78E3DD64D86A9B46CCDFF105793DCE6
                                                      SHA1:3FBFA289B12439C85F09E5419B064F151CEC768C
                                                      SHA-256:151DBC44177A314FB720ED909EAD366760B69C69DAF676FEA52248AC7AD71D9A
                                                      SHA-512:15B513572A9AB51FDAC9E6E068E10388499387E789909DFFAFD8AC0C7250DE8BE18D344CFA734C44D7941D01691261FACD0D1A95589E6A2750DE23C569F175EA
                                                      Malicious:false
                                                      Preview:.PNG........IHDR....... ........D....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 938 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):15852
                                                      Entropy (8bit):2.180251018498586
                                                      Encrypted:false
                                                      SSDEEP:48:Lnt/6DeilYk29WJsEvkHYSvl+03r8L6uo2mrxN+Y97sc5ZT7QHuJ21mVwL+zNxSG:ZSyoYkEWmFbxNX7sc55jJ2UVJS/1hm
                                                      MD5:0F78C8C46DAD3F68D060B406AA0BBF1F
                                                      SHA1:036AB74F8CE9D123260CEC6CFF908876CA370128
                                                      SHA-256:C08F7720960B2E21B1F8F106D80BCB1AF7C11433E3B35D7AE2994254A2A2583C
                                                      SHA-512:5639E0753C37D3D7755F7062792E6FEBB8DE2BF045A37D63CEAA01633D8AD235E3DA31B8F8624B49FDE92D5A10B007450EA7BDC10519A75B464073A77221218F
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......*......$.[....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:OriginalDocumentID>xmp.did:d310b992-d270-4e81-a192-9dd67f063430</xmpMM:OriginalDocumentID>. <xmpMM:DocumentID>xmp.did:9B19ACF450A311
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 469 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):15271
                                                      Entropy (8bit):1.8452160313088866
                                                      Encrypted:false
                                                      SSDEEP:48:l/6DeilYk29WJsEvkHY+ldKb8LVoBd8xN+Y97sc5ey72M+1ZVO73:lSyoYkEWmFvxNX7sc51F+w73
                                                      MD5:E60583E0C49F0D046D2CFEF1179A8390
                                                      SHA1:0B135A9B5145F3CFECE8B1E250374CC36D1062B6
                                                      SHA-256:E90F2CD8CA1D0FEB9A8C73908CA021B085816A9F469C4B4CA07C12F1996C7A59
                                                      SHA-512:A5A4F52243F8E12C83C8B93D38BEF532CE842B33F75C54FC35E37C1BB6B15C035BB926D9FA2BDD200BD13C64AC478983C9D4A64DB1E5B39C347A22104BE338AE
                                                      Malicious:false
                                                      Preview:.PNG........IHDR..............&t.....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:OriginalDocumentID>xmp.did:d310b992-d270-4e81-a192-9dd67f063430</xmpMM:OriginalDocumentID>. <xmpMM:DocumentID>xmp.did:4795134350A411
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 938 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):15718
                                                      Entropy (8bit):2.093683853279598
                                                      Encrypted:false
                                                      SSDEEP:48:Lnt/6DeilYk29WJsEvkHY2c0ldKb8LCcjogERxN+Y97sc5ZT7b55CdptFVCX8PhQ:ZSyoYkEWmFFc/c2xNX7sc55bDChmsQ
                                                      MD5:CD614F26DD67507EF8C17E5A3133A45E
                                                      SHA1:E2561CA51CCA6CAB76C8F5EB0F12ED1F26E52D15
                                                      SHA-256:30558D6E8D8F862D10D1DF81DBB6C54503F3ADE7DD134DC2CE1E3F0AC9C4D0BC
                                                      SHA-512:3581FA40BF869C94AB3BDD7A72476B21B3FE2FE7DBF2D9157086829677471E6C4E7ADF1A647A769A5010505E591A99EE3239587E8D8314CF6E058CFE9A0EAC84
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......*......$.[....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:OriginalDocumentID>xmp.did:d310b992-d270-4e81-a192-9dd67f063430</xmpMM:OriginalDocumentID>. <xmpMM:DocumentID>xmp.did:4795133F50A411
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 469 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):4006
                                                      Entropy (8bit):7.7061956531048965
                                                      Encrypted:false
                                                      SSDEEP:96:xk2UD9C4cfrisM3CtXOKGKMifbU77frXKtKis:xA9C4JsMaaKMaU7H6Iz
                                                      MD5:864C92E2AD1CCBE672119BFD82DD128F
                                                      SHA1:79F76150628D2775CA0896FAEEE778DA9538533C
                                                      SHA-256:E299AEA7584E17F41D1EE2BAE28F491A26CB7E7D4B95B366D485C300D06D3BAB
                                                      SHA-512:12B968B5BA605D04CC2C967DF12A8D03A73478AE77443CEC20E547C12189E3E661A82E07CD40AB56F3941E37809BC690708C7479F64B9CF0059B820A588F93BA
                                                      Malicious:false
                                                      Preview:.PNG........IHDR..............&t.....tEXtSoftware.Adobe ImageReadyq.e<...(iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)" xmpMM:InstanceID="xmp.iid:BE40EF6756F011E49982F9FD4AE2C288" xmpMM:DocumentID="xmp.did:BE40EF6856F011E49982F9FD4AE2C288"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:138771F856F011E49982F9FD4AE2C288" stRef:documentID="xmp.did:BE40EF6656F011E49982F9FD4AE2C288"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>27K.....IDATx..;o\...w..7..K|.........`()..T.A..@R)....X.L.T*........)..%...|S9........,a_.B.......3w...-/.
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 586 x 26, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):17542
                                                      Entropy (8bit):7.948114370250419
                                                      Encrypted:false
                                                      SSDEEP:384:iJXE05JIf/2oqt5dWebFm6rCvQbJ+6Xi3E8ueIuE+x1Fmz:S35JIfeh5d9hC6+h3EOZmz
                                                      MD5:566E1E4BC5914CDC4AADAB38A9C637BA
                                                      SHA1:09462221E91CE30669AB09FDD613D16E3906A8CD
                                                      SHA-256:2B268037A8D69346D4FE413D19874DA3C91260B265357129EB8310CB1A0E6401
                                                      SHA-512:4D88028503B851897608745E9D85B6B96B32701FE9FF8E5A9825100235A62D85F7C35379AE6AD6696DF93842C6676DF70010A96CD94FC7A5C79C9F79C3169FE4
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...J.........H2sG....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 704 x 32, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):19025
                                                      Entropy (8bit):7.953390283515495
                                                      Encrypted:false
                                                      SSDEEP:384:4JXE054wd0iiQWVm6Dra/Dx0oabj8BzAYa0oEAXpPwRZMN5/Tk/i+:E354wd0iGQkaLx0hbj8Dyp4RS5LN+
                                                      MD5:8125AE6D5A5FB78C5B13C84A221AC120
                                                      SHA1:C08EF525B815E282DEE44CBB809E1EEDD09BFF3A
                                                      SHA-256:7817B734D26F6C3EA8E1C22E1DEDE8BE8C7F711C1924D2B3BA2AE5346C7F526D
                                                      SHA-512:BF11C87713314A6732A2CD00E137078A28AE827EAF1128817D4CB7BD2836930050ED3355BF3AF7979E8199DAB62EAD311314F831B85857CB4EDC8C39A25DF5B7
                                                      Malicious:false
                                                      Preview:.PNG........IHDR....... ........D....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 938 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):8079
                                                      Entropy (8bit):7.832542660896185
                                                      Encrypted:false
                                                      SSDEEP:192:V9Re03MEaczLw7jZe290sKruwPVSclaAlf+RCAaWY:nRNMBJ7jZe2hKrusVM3CA1Y
                                                      MD5:CB231F0311D26F6EC4FAA626F826F14B
                                                      SHA1:90731FAF98307EACE4CA024E43CF912BBC461864
                                                      SHA-256:0AF4A194FBC1A6E78552F299348F0D60D5B2B9AB014E41A56E57D46AB18DC889
                                                      SHA-512:5FBA8C6D81063D9A8229F4D9DACACF1671A052F6DDC8B08F324E42895F4D760217788873685C86AED7E1DFFBE88EC151CC76895CBBBE499FF6B416D3088B0246
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......*......$.[....tEXtSoftware.Adobe ImageReadyq.e<...(iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)" xmpMM:InstanceID="xmp.iid:BE40EF6B56F011E49982F9FD4AE2C288" xmpMM:DocumentID="xmp.did:BE40EF6C56F011E49982F9FD4AE2C288"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:BE40EF6956F011E49982F9FD4AE2C288" stRef:documentID="xmp.did:BE40EF6A56F011E49982F9FD4AE2C288"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>...@....IDATx....ez........ff.+..Y$..M$$"1.L6......D..d...".X3.."..,.HF...."....".E2`|i..v.ovw.8...}.m.z.O
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 24 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):15685
                                                      Entropy (8bit):2.1042569927335855
                                                      Encrypted:false
                                                      SSDEEP:96:XSDoYkEWmadf6xNX7sc5otTxXkdE4ypXYt:XSDrk6adfoGxUWzXYt
                                                      MD5:784ABEA138D9F1E5A1026162AF5BF2CD
                                                      SHA1:111F835763A39EC7B8F697B1D90B22BFD3666A57
                                                      SHA-256:5C7B6B5456CAABC9D5A928AC892D9903836693960517C4E534A5DE1ACD6AE428
                                                      SHA-512:01BE96B4A05768641113679E96778B44A2EA22EE127349DEAC80A90BF5540518FF352054884AC51A3719A882BE1676C85515EFC66D8641F3F0E82336366CB612
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............\..&....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:DocumentID>xmp.did:EA6FFBE8583611E48B3EF836581BB4DA</xmpMM:DocumentID>. <xmpMM:InstanceID>xmp.iid:282ff2f8-5a68-4a52-b1dc-91de0f2f07
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 30 x 27, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3838
                                                      Entropy (8bit):7.91008458008801
                                                      Encrypted:false
                                                      SSDEEP:96:ySDZ/I09Da01l+gmkyTt6Hk8nTvxTQrgyZt:ySDS0tKg9E05TvlQ8yZt
                                                      MD5:4A2BF8C96F910B1B2AE63A9F4A0D4B8F
                                                      SHA1:D1665DF62B650FEB01035D5123D0BFC8EA75742C
                                                      SHA-256:0CB2F4EE1C451A8825EB8EDB45858B28345F73423C7A7AEF4168C46F7E3638BF
                                                      SHA-512:6E894AAB6239D6EC66E79EC156BC79AE12AC2D9DD877D00CEF760F9F278C99F0CB9816E64B6358206A8D2087DFA05B75DE7ACDB2AFD1563608298F645E32867C
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............k.?.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 36 x 32, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3942
                                                      Entropy (8bit):7.915201742478639
                                                      Encrypted:false
                                                      SSDEEP:96:GSDZ/I09Da01l+gmkyTt6Hk8nTN7L3bPDoifR7b:GSDS0tKg9E05TpPsSb
                                                      MD5:CA3872EAE64C5BFD8D41198990B11950
                                                      SHA1:97221D798EF24E4B3384B254B17B7561901A9304
                                                      SHA-256:3438623C461F8F141976A931D3C00F6877D07CF4A8B534AF1EF9FDFE8B0C6174
                                                      SHA-512:1863BB97606D6157A98CEAAD6D043428913952B86D6B2C9B0C7AA85148DD40483CDC0D3BF430C681249652F1F8D785F23392829C700F862C89435F10046F9C20
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...$... .....z......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 48 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):16468
                                                      Entropy (8bit):2.5316051074868398
                                                      Encrypted:false
                                                      SSDEEP:96:pSDoYkEWmK9p4xNX7sc5p/zWrDHtfQ5i8D74W:pSDrk6qs/YDHt45i8D7z
                                                      MD5:3683A511B9DBA974CD9F36A6B023E423
                                                      SHA1:2E5B6B0F66094A5692F53E6DF055B2889AAE709E
                                                      SHA-256:210F1B214ECCDE9E148072A10FC0E263FE6A443341BE4DC9630C47BC84796101
                                                      SHA-512:2D010284ECEDD131F1A07E1A34A3C882B0A342EDF794355AC531592AA34CBB19B4792C7DFE489F5F341A91CEAC1F187C824010CC8340F2959EF0F76D1D88C274
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...0...*......O.z....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:DocumentID>xmp.did:F64702B9583611E48199864854E8DF1F</xmpMM:DocumentID>. <xmpMM:InstanceID>xmp.iid:19e2d7fb-cbd8-4318-85de-a4692cc16e
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 24 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1371
                                                      Entropy (8bit):6.743983154707753
                                                      Encrypted:false
                                                      SSDEEP:24:G1hepWwh82lYSKwx2fSVhCtT3JryJ3V0emG66dMYOF0aK3Uk+4c1mjmD/Bn5R:MccvnLHqrk0J3+r1jcUk+4+TD/95R
                                                      MD5:74172250EC6AA49412189DBC0C1ED6E2
                                                      SHA1:AB844088660A6ED32A6274C06CC05D659FEB1EAD
                                                      SHA-256:B7771AC44AB547A772787C6DB58AFCAB0E603E8F9127F3A486A7792EE3E04A90
                                                      SHA-512:ACC43D5A267754E2C971C2A14A1392F8936D5E87BDB4D5A41D57F87783AC31DB30D7D6FD0820ADF568FD28CA001E9A0869AC0118A5DDACB746378CF35388C979
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............\..&....tEXtSoftware.Adobe ImageReadyq.e<...piTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:A221B57F583611E4A24EEB6D32DEE939" xmpMM:DocumentID="xmp.did:1EB36218562B11E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:1EB36217562B11E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:385c59cf-353e-4037-b78d-79b10c708ef3" stRef:documentID="xmp.did:A221B57F583611E4A24EEB6D32DEE939"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.d.$....IDATx.b...?.-........o..2....d....
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 30 x 27, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3270
                                                      Entropy (8bit):7.889166904606499
                                                      Encrypted:false
                                                      SSDEEP:96:ySDZ/I09Da01l+gmkyTt6Hk8nTyHtne3Ws:ySDS0tKg9E05TyZs
                                                      MD5:CD14309BBB8F5AD698E3196BBFCA88B6
                                                      SHA1:77ABAE837386F0BCE173F86156AE02FE62255876
                                                      SHA-256:CF9AF9956E356D637E43A0B82C9328B13764ECD0BB3E3686A08AA2C2640A6C8B
                                                      SHA-512:5F863CF9B696504E0193C56BBBBED240E2D6BD782BB15391B2EAE7B8137B12BBB9818966F8AC6048C1C490056C660D95AD16541C57492DC997B85BA459392634
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............k.?.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 36 x 32, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3424
                                                      Entropy (8bit):7.89764633408354
                                                      Encrypted:false
                                                      SSDEEP:96:GSDZ/I09Da01l+gmkyTt6Hk8nTirbKMa7pJdD:GSDS0tKg9E05TcteR
                                                      MD5:AA02AB840568AD99107CDECE6621C3AC
                                                      SHA1:5813000FF1348CF78C41E0B0B90387EF7FF8A83B
                                                      SHA-256:8743B4FEBE9F3C99E1C5B647255E6367DDAC8580E1388FEAF78E0BC84FBB1776
                                                      SHA-512:F3938E87EAA095EC69D814514176559C2B153C75802C12ADDDDBAEC67D476AEB6A6FD2066BE536265B28C36C8C0B5BFF940205F96C898861739D4E2EFF86A029
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...$... .....z......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 48 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3671
                                                      Entropy (8bit):7.905884132187789
                                                      Encrypted:false
                                                      SSDEEP:48:p/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODnyDQqkHjz:pSDZ/I09Da01l+gmkyTt6Hk8nTnythI
                                                      MD5:1B00A6BCC425DBD0ACB92E3664488B0D
                                                      SHA1:BBD3CF9F25ADD0D1386A5AE18823FD0F880B11BA
                                                      SHA-256:48BEE3671DED91AEE651F5CAC0CBEFD83D760F02EFD376F77364C238F1B14389
                                                      SHA-512:2CF00A629C540483D182B4E73140182A2CA0402FC296705A80A46BA0A8DB2F6D5A34067AE69331218D871288D6EAE8EE3D5AC740568A6A2C536510C32FE65AE8
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...0...*......O.z....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 24 x 21, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1313
                                                      Entropy (8bit):6.639591320735671
                                                      Encrypted:false
                                                      SSDEEP:24:G1hepWwh82lYSKwKQFDfSVVtT3JryJ3VJ4kKQKGySGk2V5ZmvMwrtDZbM:MccvnLXd0J34Hs4vZmJrtDJM
                                                      MD5:BD94C635B00CC2EA4872591AE3DAC517
                                                      SHA1:BEE4E084C00B4366D950D6411836FDFBE8429940
                                                      SHA-256:AACA1B27A5186DF31E60AB0BCFE35D411E03FD7CD069FAFB92314947FD92F256
                                                      SHA-512:DCCFFFF2EC7F6A42DA6D8366A7B3021DF114E66D00183FCBD1DB0EBD99DCF0605F10BA5733D2E449DDA0D6395931BCAC0FEBAE27C2FC2F9C1089F1F941D2E89C
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............\..&....tEXtSoftware.Adobe ImageReadyq.e<...piTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BD5CA0B1583611E4AF4082BD038A9F50" xmpMM:DocumentID="xmp.did:45DBC055562A11E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:45DBC054562A11E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:c6a04b65-591f-4d99-94f7-102af1675f50" stRef:documentID="xmp.did:BD5CA0B1583611E4AF4082BD038A9F50"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>X..Z...GIDATx.b...?.-...#..FFF.7.j.@.F ~.
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 30 x 27, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3356
                                                      Entropy (8bit):7.899201293051617
                                                      Encrypted:false
                                                      SSDEEP:96:ySDZ/I09Da01l+gmkyTt6Hk8nT8a3vpTiM:ySDS0tKg9E05T8a3vEM
                                                      MD5:B33C312C95B36E4A3B0F4984B9FE09F2
                                                      SHA1:D41E2580ED7A0722E9941565F578EB05FE8DFAFA
                                                      SHA-256:BA0D355243271CB79F5E3EAA3BCAA8BF9169C2E5B0B8E98C6E8418CF6F15AB9D
                                                      SHA-512:CC3402171F5329C9B89385500CA35EF8DBF17BF01B2A6DF006D404CFCD4533166A8F856F9DE3E21CBFF771143A5029F5922FA13EFC4DC15B922C80BD24DF1AAF
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............k.?.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 36 x 32, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3365
                                                      Entropy (8bit):7.901512383605323
                                                      Encrypted:false
                                                      SSDEEP:96:GSDZ/I09Da01l+gmkyTt6Hk8nTgLQqSfKe:GSDS0tKg9E05TgL6Ke
                                                      MD5:5CC222F110ED5839F910FBBA15F35368
                                                      SHA1:9E99B854069795EFFDD033049CB93F9E431CC98F
                                                      SHA-256:EEE6E710161A3AA8488FB4C1F118B43FA5C377ECDEDFFAAE78A81865F16CF288
                                                      SHA-512:EFDBAD80A13988170B67E72D75AE444482A5CCDC16E23001CFCBC2C11FB127B953D2641621F0FC5964B9881AB2D0EF507E4131C433F90A08C110E810B8BFA112
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...$... .....z......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 48 x 42, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1684
                                                      Entropy (8bit):7.08618077937191
                                                      Encrypted:false
                                                      SSDEEP:24:g1hepWwh82lYSKwKQFgSVRtT3JryJ3VJ4kKQKGubbZAqHjWKC6/dRv3ioRPBdQBD:+ccvnLs50J34H9bfiohhQBNuA
                                                      MD5:8E680B8EF37CFFCE4A9CD767D343A175
                                                      SHA1:6EF6922007DEA53DD42D010C6DF6860527C703EC
                                                      SHA-256:6B9CAE182EC085BD8CC7D52DE0FD175CE7CB0186119C8E6E85230FCF9D10E318
                                                      SHA-512:0129FD9615655AF3174EADBD11B6C19F3FEA40B3E362F16B18C3A5EDE0E3F57457C53B0A3CAFEE4F3827E6CE6308BD328BD42389EB9CFE27A6BEB28D1A5FEA51
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...0...*......O.z....tEXtSoftware.Adobe ImageReadyq.e<...piTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:BD5CA0B1583611E4AF4082BD038A9F50" xmpMM:DocumentID="xmp.did:1EB36214562B11E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:45DBC058562A11E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:c6a04b65-591f-4d99-94f7-102af1675f50" stRef:documentID="xmp.did:BD5CA0B1583611E4AF4082BD038A9F50"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.e.Q....IDATx...k.A..gC..P/...M..". ..."
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:GIF image data, version 89a, 1 x 1
                                                      Category:dropped
                                                      Size (bytes):43
                                                      Entropy (8bit):3.0314906788435274
                                                      Encrypted:false
                                                      SSDEEP:3:CUkwltxlHh/:P/
                                                      MD5:325472601571F31E1BF00674C368D335
                                                      SHA1:2DAEAA8B5F19F0BC209D976C02BD6ACB51B00B0A
                                                      SHA-256:B1442E85B03BDCAF66DC58C7ABB98745DD2687D86350BE9A298A1D9382AC849B
                                                      SHA-512:717EA0FF7F3F624C268ECCB244E24EC1305AB21557ABB3D6F1A7E183FF68A2D28F13D1D2AF926C9EF6D1FB16DD8CBE34CD98CACF79091DDDC7874DCEE21ECFDC
                                                      Malicious:false
                                                      Preview:GIF89a.............!.......,...........D..;
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 76 x 66, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):17247
                                                      Entropy (8bit):2.887938120045245
                                                      Encrypted:false
                                                      SSDEEP:96:ySDoYkEWmENcxNX7sc5gojgiitBvkkrXa3dIFPDob5sT1hPutlb:ySDrk62CRjkjrK3SPDui1c
                                                      MD5:7395444416AB7A3D5A196E2F46269AFF
                                                      SHA1:5CC1B423AA9AE9C9006FD64050A7D75260E76FD0
                                                      SHA-256:59BC5272A4A2940EF7AAD07C960200135DD9909B3150C3322F0E62C1E40709B6
                                                      SHA-512:55BCEE0E633EA8793A47B2D84D6E0420B664A0762C65D6D0ABD3D9286A74A94F470E383E637712EC9E0F973DD22EA7257C74A899FD74EBE454F30872547C13DB
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...L...B.......0[....pHYs...............9.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:OriginalDocumentID>xmp.did:2BF1BFAD2BD911E49916CB7D9A165688</xmpMM:OriginalDocumentID>. <xmpMM:DocumentID>xmp.did:7BB8A9BE583711E498
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 202 x 41, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1465
                                                      Entropy (8bit):6.904092804952445
                                                      Encrypted:false
                                                      SSDEEP:24:Yw1hepWwh82lYSKwT3cSVFctT3UyJ3VHmyLGSOKsQ1DR2t3mRmQeO:PccvnLydrmLJ35vLGqR2ZVO
                                                      MD5:75F7FA789C4322D218C258859275E6A0
                                                      SHA1:E788FC36747D28FB39891779FD9204AD24AFA977
                                                      SHA-256:F85D45BBDB7B50784D1920270D4EDC1398F59DB6B2385BDAE999F5A4B7D0B65E
                                                      SHA-512:7E3FFF74720840506019C3C4294D2BF493C9B64699F99C5CDC5F94557EBE6DAA62DC143C96F97A549A7731D17F7C47C6B7FE7D348EBA9E4B84836E9861DB0A21
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......).....t.......tEXtSoftware.Adobe ImageReadyq.e<...kiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:6505BAB3562211E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:6505BAB2562211E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:683DC7D2583811E49348A22987B030AD" stRef:documentID="xmp.did:683DC7D3583811E49348A22987B030AD"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx...J.A....q..WA$.J#.FP....bga...
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 253 x 51, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3825
                                                      Entropy (8bit):7.899828298029405
                                                      Encrypted:false
                                                      SSDEEP:96:GVSDZ/I09Da01l+gmkyTt6Hk8nTXF62en2u7fzj:GVSDS0tKg9E05TX02en2kH
                                                      MD5:37CD17C8DB198EB4D52395A29DD578D3
                                                      SHA1:64D2FDA1B06B6BEABA8280CFBA70704ADA45704E
                                                      SHA-256:BB6A3E1DD1C5F113FC353C1820B404FCDD3AD705C0D0FEBF8A10D3618C4CF226
                                                      SHA-512:BD28CDDE100FC6FAF2FF487C8EA9FC77B60FFB864CF50F26DC0F796D00D1824B253D230766CA61D8A17801E81D6B5783C3A7C1C084EEF9EF4B41A39ABBCE5BC5
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......3.....\..8....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 303 x 64, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):4072
                                                      Entropy (8bit):7.892738630774733
                                                      Encrypted:false
                                                      SSDEEP:96:ESSDZ/I09Da01l+gmkyTt6Hk8nThUw0Gcly:ESSDS0tKg9E05ThUw01ly
                                                      MD5:5927724DA5CADF0E47941A63F15E6317
                                                      SHA1:BB829E636D66D39C1DDDAAAA7888208288E60C99
                                                      SHA-256:EBE49CCCE22216C64235DE639DFE6027E91346DF06B0D87FCE40D517E78C3E02
                                                      SHA-512:E670D2218668048B3743056AEB3EB811F59201E37A4B9F323E475C14665B479D98C8F09B99DD9342CB7F4A3DB8CDACB72F4169B4E20BB71CEA8A88979EEBBB84
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.../...@.....K.......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 404 x 82, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1974
                                                      Entropy (8bit):7.23321888926861
                                                      Encrypted:false
                                                      SSDEEP:48:4cccvnLmdh9mLJ35vLbYcnLgC8hMsjkXzEHQslHiz:4bM1jbYugfhf1cz
                                                      MD5:3CC66D6F10C087608BD2F42109C31E5C
                                                      SHA1:FECEB483410580219C41347EB652C70AB42F589C
                                                      SHA-256:411958454CC7B99DE0C5B4B03DFB232BAFD9A4C1C0B078791EB2C6AE24B1B088
                                                      SHA-512:F17DBD0BCCFC0CF52793C1FC81014E36E7FD0C2C86CEDFE0131E3E5A719FB547742279C03D309DA3414BC3E502BE7CDA71CE0069F9B85762C42C9834604D1EFD
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......R.....s.".....tEXtSoftware.Adobe ImageReadyq.e<...kiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:6505BAB7562211E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:6505BAB6562211E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:683DC7D2583811E49348A22987B030AD" stRef:documentID="xmp.did:683DC7D3583811E49348A22987B030AD"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?><.1....IDATx...MoTe...w.E.c-.....8@b`..m7l..F
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 114 x 20, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1265
                                                      Entropy (8bit):6.514955455049238
                                                      Encrypted:false
                                                      SSDEEP:24:o1hepWwh82lYSKwTXteSVUGtT3JryJ3V+Td6aBAYGzZpdyaEt8oDf:mccvnLA70J3ydEYePd1EtN
                                                      MD5:6EB683E95CD60BB514B2BC7C636B64EB
                                                      SHA1:BF7C964F94C3114CF746410159F0511C0B91BE08
                                                      SHA-256:EABE78CA6F8CFBB6E7D53FD04DBFFAA9D9FBD6949AB2141713A24B58EFAC30A7
                                                      SHA-512:852015492F896487BFC146182D9946035E785725EC104467DE98B7BFBF26715AA297470573A4A93ACC425FB93CC0B0C4DA8F154500D2B3C9E1DC01B519F95EC4
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...r.........Qpi:....tEXtSoftware.Adobe ImageReadyq.e<...tiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:CFA096EA562911E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:CFA096E9562911E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:e30d50b9-c156-4001-8a22-fde2496e8f6a" stRef:documentID="xmp.did:8F6F774E583811E4A679D6C85F0991F3"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..(.....IDATx..Aj.@....A]..ERA..1r..
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 143 x 25, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3360
                                                      Entropy (8bit):7.8900672229753885
                                                      Encrypted:false
                                                      SSDEEP:96:xSDZ/I09Da01l+gmkyTt6Hk8nTPlR9r5h1:xSDS0tKg9E05TPlP1
                                                      MD5:13EDCA9A9A75F8CC9AE24A9DAA61C478
                                                      SHA1:EB5B1D3CDAF35BA32B4D5005F30DE6F7944410A4
                                                      SHA-256:1CC5C7A5D650CBC028B38CF50EBB4A72EE807E3BA7F26941DF0F6A10E776CF95
                                                      SHA-512:39D77B7DBDECC129A2622C9ABA855E2AC24B4F1E3F117705F4C8A0E7BBB2CC8E3228AA69B5ED29D732AD466685460A232236D7DF680AAE497123A8C67CB771FC
                                                      Malicious:false
                                                      Preview:.PNG........IHDR..............\}.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 171 x 30, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3495
                                                      Entropy (8bit):7.89343889560188
                                                      Encrypted:false
                                                      SSDEEP:96:BSDZ/I09Da01l+gmkyTt6Hk8nTvDeQN/zt:BSDS0tKg9E05TvDeQN/zt
                                                      MD5:18DC81914DD758BFDA5C8C7453B5F692
                                                      SHA1:1BC05BAF1DD0CF9B5C4153804237AEC8461A3753
                                                      SHA-256:60A7FEF3552E22A4AE610F9001C0A3BAD4DD3D6F7D2A8B18F190F91513D7A6B6
                                                      SHA-512:F9912153C5E8D77D983C71A99C6263D788AD26B4FB4F8B4E03F7EC79FDBFE9BF2F0B436963960343EDCD1B6E819F571BD72E67A132A678FC437AA927C88E09D3
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.............S.......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 228 x 40, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1540
                                                      Entropy (8bit):6.953620509090344
                                                      Encrypted:false
                                                      SSDEEP:24:F1hepWwh82lYSKwTXtySVU/tT3JryJ3V+Td6aBAYGCOk4qbxclLzXH9ARLaFc+/t:rccvnLMW0J3ydEY4gGl/dAReFpBdEO
                                                      MD5:1BF8E27E0893ADBD55BA53DF8DC54B9A
                                                      SHA1:DE6B1E5387476A4174193C0FDF87DAE539C31688
                                                      SHA-256:65EF4CB1B2E87057569616F96FF909A8E31DC468319A1C03B61F2560B7F9631A
                                                      SHA-512:C7C710EDA324E31D4E2A0C323C31F9B2E3725265B63E13DDF6382BB7C0AF4504B93F20B39088ED510D2D2BA6829D14116D6A7215ECC3F98E4C1A773DFB36E394
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......(......}VB....tEXtSoftware.Adobe ImageReadyq.e<...tiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:CFA096EE562911E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:CFA096ED562911E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:e30d50b9-c156-4001-8a22-fde2496e8f6a" stRef:documentID="xmp.did:8F6F774E583811E4A679D6C85F0991F3"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>x......&IDATx...OK"a.......%.R...;....
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 122 x 41, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1444
                                                      Entropy (8bit):6.84914262697585
                                                      Encrypted:false
                                                      SSDEEP:24:61hepWwh82lYSKwTXtASVUDtT3JryJ3V/snhSGTndQaiOzzE5We2C0Di3InHPl0g:YccvnL2e0J3rEndQaFz2WedB4HdN
                                                      MD5:45B41112162E9B633E54D315A182983F
                                                      SHA1:7AB62C3D0812305DA419FAD34F3A3E7EEADFC572
                                                      SHA-256:EB2ACBBDA0DA676B8E12AF944DB41F916380F7EAF70818FD70626D3D6B1564C2
                                                      SHA-512:1C4649B53ACF2BC9015F56E4EC650D112803E2088E1438C59791788958521F45946C1B74FEEA335FC181A326EE29369FF937B2A71891C181D6836ECA829B1C18
                                                      Malicious:false
                                                      Preview:.PNG........IHDR...z...)......C=.....tEXtSoftware.Adobe ImageReadyq.e<...tiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:CFA096F2562911E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:CFA096F1562911E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:d99b3e1d-1bc8-4b70-9ba7-bd9ea50b9821" stRef:documentID="xmp.did:D2A0077F583711E4A1D0D2EB38AA961A"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.t_5....IDATx..AK.A..gf'.......3.K`..
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 153 x 51, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3785
                                                      Entropy (8bit):7.909192793023571
                                                      Encrypted:false
                                                      SSDEEP:96:ISDZ/I09Da01l+gmkyTt6Hk8nTMGC/S+bduWnNK:ISDS0tKg9E05TMGC/SCuJ
                                                      MD5:80E0C0646B0E68900A5917908E00A1DC
                                                      SHA1:A1595BF04F137CBC9C59534AC4AD89ED426099E1
                                                      SHA-256:803012ADAB2ECC8BF5A415A1CD0B3275DC111102E8079996AAE15252E5465883
                                                      SHA-512:30FD15CAD438151843E7A9AC4F93580FBB107F3513E40E42BE8A538BB5626DA53513201D42CBF9B2CCFC6761EF4B3E87D3298968C82429F0ACB28DB3BAE84D75
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......3.......2....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 183 x 62, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):3954
                                                      Entropy (8bit):7.911174881926204
                                                      Encrypted:false
                                                      SSDEEP:96:79SDZ/I09Da01l+gmkyTt6Hk8nTeeh4UEJZ9nJvm:BSDS0tKg9E05TeC4UG9nJ+
                                                      MD5:793051F2B56DBAB490F90D882D0E0564
                                                      SHA1:A4EA713715FED209E236901479C7CFCEC2EE8EAA
                                                      SHA-256:9EFCA08473FC2478111C4B55EF97611F95435CE0BDADE9C80247EEFA2AA9E363
                                                      SHA-512:22D3A9A832A3857244388E02C64C61DAEE8B064157C50335D41C8E65696516A513CFA50C40649CE07202A82DDA3F4845E21E6EA36222FFA4AF1C73A5AE583987
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......>.....i......pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:PNG image data, 244 x 82, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):1887
                                                      Entropy (8bit):7.215984262146164
                                                      Encrypted:false
                                                      SSDEEP:48:zzrccvnL3tf0J3r0ZwSgxn+URFIlfJbUzvjIe:4MNqJ5xn+llhYzrN
                                                      MD5:E34E6D888B89626B6932BEFF5DF5306A
                                                      SHA1:2DF20A1C6D917C13E9373690B8645674224600FF
                                                      SHA-256:A93CA7125EBAE14039AAF0A771D489D17D6C20BB2D2B1E1B8B489496415CBCA9
                                                      SHA-512:318DE9554148FAA225018A0A2D176F26EB4DA6F3F500AC00408E573C7DCEE025A479EA4C67EF7E1011EB4DB526AEFCB15D79672BE65D03EAFCABF1877FE3F26B
                                                      Malicious:false
                                                      Preview:.PNG........IHDR.......R.....cj......tEXtSoftware.Adobe ImageReadyq.e<...tiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:d310b992-d270-4e81-a192-9dd67f063430" xmpMM:DocumentID="xmp.did:45DBC051562A11E494A1902F47C3AA34" xmpMM:InstanceID="xmp.iid:45DBC050562A11E494A1902F47C3AA34" xmp:CreatorTool="Adobe Photoshop CC 2014 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:d99b3e1d-1bc8-4b70-9ba7-bd9ea50b9821" stRef:documentID="xmp.did:D2A0077F583711E4A1D0D2EB38AA961A"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.D.=....IDATx....o.u...O.vLV.H'.).b...
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):49120
                                                      Entropy (8bit):0.0017331682157558962
                                                      Encrypted:false
                                                      SSDEEP:3:Ztt:T
                                                      MD5:0392ADA071EB68355BED625D8F9695F3
                                                      SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                                                      SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                                                      SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                                                      Malicious:false
                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1369
                                                      Entropy (8bit):5.042349729995224
                                                      Encrypted:false
                                                      SSDEEP:24:OPH/wMz8MespW0mWUvF0k6aM94NaM94SKCBMazEJMThHyaPqAVg7vVsI6:OXntkRWmFC9u9sCaazECFHyafVFH
                                                      MD5:AB2A2BC6C53F862BA5018B7A6EA76C08
                                                      SHA1:3BF47FD954DC9DCE93DA87B0EA42F78488646A4E
                                                      SHA-256:240B1B561A404C5309587A17F3B0FBFF6ACEE2E816D565BDE1999C60CB00FC1F
                                                      SHA-512:78180D38566AF52FB74B71AB9BE9009E4A75B36C6D27056C851849B7077CD1F8C0500F1178FBFE3CDFAE590B9A9A6DDAB812E460971D03F0127C01E09648AF03
                                                      Malicious:false
                                                      Preview:.<!doctype html>..<html lang="en" style="font-size:3.26vh">..<head>.. <meta charset="UTF-8">.. <meta http-equiv="X-UA-Compatible" content="IE=Edge">.. <script src="https://use.typekit.net/bxf0ivf.js" type="text/javascript"></script>.. <script type="text/javascript">try { Typekit.load(); } catch (e) {}</script>.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>ADM</title>.. <style>.. body {.. margin: 0px;.. background-color: #ffffff;.. -webkit-tap-highlight-color: rgba(0,0,0,0);.. font-style: normal;.. border-top:1px solid #c7c6c7;.. }.. </style>.. <script>.. function onLoadComplete() {.. function messageFromNative(message, jsonDataString) {.. window.messageFromNative(message, jsonDataString).. }.. window.sendMessageToNative("documentReady", "").. }.. </script>.. <script defer="defer" src="../SC
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 40156, version 0.0
                                                      Category:dropped
                                                      Size (bytes):40156
                                                      Entropy (8bit):7.99077330546425
                                                      Encrypted:true
                                                      SSDEEP:768:zqK4oMIHg6OWlw62kItML9n0TM+rMiVIoZSruxA443l0PPv:zf45IAFemML9n0TfVIeauxB43l03v
                                                      MD5:83E5380B9DC2077B664E383CF6FCF47E
                                                      SHA1:D8AE10285EADED477A647A39293E9294958C0572
                                                      SHA-256:741A4BC7D04FC8385F9A1DB0CCC586A224F14233B08D764D37EA165163A247A0
                                                      SHA-512:8EB2833ABC2C13491D2BD30B962A41457AEEA3F5C782108E6319B0ABDE0C97AA3B347D57E8A031DBC5B4BCF5DB3729D68D6F2A098E182BD5C62E761A1476B313
                                                      Malicious:false
                                                      Preview:wOFFOTTO...........l........................BASE...D...F...Fe!].CFF ...8..v.....Q<..DYNA..zD........d...GDYN..{@.......Q.ow#GPOS..|`...z..7LUd..OS/2.......Y...`].y.cmap................gasp................head.......5...6..%ghhea.......!...$....hmtx............h8+.maxp...0.........0P.name............E..post........... ...2..............ideoromn..DFLT..cyrl..grek..latn...................Y..............x.c`d```5...5...+.3.......P/....??...[.....L Q.b..n...x...n.@.....!.V,.@.cGV.FB$m..j.H..6N<i..`O#...@..X.$<......#g........x....^}.-.x.S..t1.|......,=.b...............S.J|...e..s.O......;.]j>z>D.|.|.W...1...R.b.....}muQ..ra...R.3)Fy......T..1...s..c.g...d8..O....'M......FW...-...X*..+c...H*....t..].|=.e"..R........o.fm.......:T.^Q..z...c(.S..........a..w.KN{.l...M]..tu9...k.b.L.N...v...Y..R.[0....1...C*/..8.^...GM..r....jvfx..<.o..t.P.....=Kv-.kr..n.....5.%.9].>q......f:.3<C.e9.-5.:Yz4O....:e....+b.}.oS..1x.c`f.........).....B3.1.1..E.9..XX..X......P........
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 39564, version 0.0
                                                      Category:dropped
                                                      Size (bytes):39564
                                                      Entropy (8bit):7.989107484119666
                                                      Encrypted:false
                                                      SSDEEP:768:cyVNSFlHRrs14+NsyQTfaVEAiYgPA9eFXPi37iRX3+qqVFtZN7Pv:XSFlKTcfaVaYgweFXPiLknHqXtDv
                                                      MD5:A870EE6A735514C321010F19CE3644D7
                                                      SHA1:59FE54D58D3C53AF232A98A6EFA98170ECCEDD20
                                                      SHA-256:79E3A4E2C2274ACD602155924DC8C0B7C3AFDCD40450B2DFEDA302AD8E140649
                                                      SHA-512:B0AEBF67D8989C8F794592A892997C2372FEA9D0076E6EFAD032DD643FB5BB23C730A7EF1FF14807A52DB058E68D9094D8EE713DD2EB82E2676E90430BE29F1C
                                                      Malicious:false
                                                      Preview:wOFFOTTO........... ........................BASE...D...F...Fe(].CFF ...@..sm.....m..DYNA..w.........c...GDYN..x...."...Q.y*.GPOS..y.......7vo...OS/2.......Y...`[.t.cmap................gasp................head.......4...6..%`hhea.......!...$....hmtx............9!2.maxp...8.........0P.name.............8I.post...p....... ...2..............ideoromn..DFLT..cyrl..grek..latn...................`..............x.c`d```5.J}..5...+.3........P..?.?....1 ....$..fn.Rx..An.@....I..jo0.>...!..$H........`a{.=Ab.u.]...B..E..T..<...Y....3.{o....._.....k....x......c.Mj.......f~..B......9...s..A.V......g.Mj.{>F...|..0.[.5>=.P..1X....}iuV..|n..)b..R..TL...b.K].X.R...M..!..H...?....N...N...p..x..21...wS.J.T.m...;.Jv..Y....e..B.....kk....o.&.rn....z~u...%. .Bq\..X.`.M.b.....)p...Y-........r.L.`.5+..i>5.;.<..C3%'...U...X......D..{.!F.~...8=..c.~y.{w.s.*.{..U.....*...._....~.j....*..)Sg.....R^:.u[v..m.....j.eJ.w.u.T.....Oy.s-..m.x..x.c`f.........................L,,LL,..L.@yF.(
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):563251
                                                      Entropy (8bit):5.75805253327619
                                                      Encrypted:false
                                                      SSDEEP:6144:dbbVuAi2W7oxxnXKC9SjJ0Xh1kb9um4vMeQNQwQhevcaqLS:xVuAnW7unXrGE5S
                                                      MD5:040FFE97A1DC9ABA5AF7AEBFBECDC32D
                                                      SHA1:6A76A00485518A4F39E3D6646FD5B11FEB556967
                                                      SHA-256:189CC8DE6F0D71E1039D3659BF9A2A5C4386AC8AF3492AC2B00322176D22DA3A
                                                      SHA-512:903BB763403D7CB5AB54CCF14A92B22853CE135B724637CCBD72204C8A5746033587BC4E9895C64574A6C78A6623D32BEA3DC4D3E740B4CF4D49EAA86A4CA0A9
                                                      Malicious:false
                                                      Preview:var index;!function(){var r={1758:function(r,n,e){function t(r){return t="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(r){return typeof r}:function(r){return r&&"function"==typeof Symbol&&r.constructor===Symbol&&r!==Symbol.prototype?"symbol":typeof r},t(r)}!function(r,n){./*! https://mths.be/array-of v0.1.0 by @mathias */.!function(){"use strict";var r=function(){try{var r={},n=Object.defineProperty,e=n(r,r,r)&&n}catch(r){}return e}(),n=function(){for(var n,e=arguments,t=e.length,o=function(r){try{return!!new r}catch(r){return!1}}(this)?new this(t):new Array(t),a=0;a<t;)n=e[a],r?r(o,a,{value:n,writable:!0,enumerable:!0,configurable:!0}):o[a]=n,a+=1;return o.length=t,o};r?r(Array,"of",{value:n,configurable:!0,writable:!0}):Array.of=n}(),Object.defineProperty(Array.prototype,"fill",{configurable:!0,value:function(r){if(this===n||null===this)throw new TypeError(this+" is not an object");var e=Object(this),t=Math.max(Math.min(e.length,9007199254740991),0)||0,o=1 in a
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 40596, version 0.0
                                                      Category:dropped
                                                      Size (bytes):40596
                                                      Entropy (8bit):7.990882155754029
                                                      Encrypted:true
                                                      SSDEEP:768:B2Ws4f6Rc1d7fPlzKC8h7Wy1qmDG8WCecBE6SvNxkCTuLQjlrXPv:B21o6A7fPlh8iPClQNxkC6+1/v
                                                      MD5:590A9EEBC0AC0BA776529CBA1D5B718A
                                                      SHA1:E1AA96B54C162F1DEA3CE203B45CD115051BA351
                                                      SHA-256:28195F698F74D701F5B253495756F7ECD70C50047C1F795952587E6F3E742B19
                                                      SHA-512:387ADC334C00F4083660107D9C4C3FE3461F1BF4D135A2A7DCF475FFC9C04680D0ECEA30591F253DF584F8F063CC430D69162AD1B8BFFB6C01972079BF6447BF
                                                      Malicious:false
                                                      Preview:wOFFOTTO...................................BASE...D...F...Fe.].CFF ...P..w....n..z.DYNA..{.........d...GDYN..|....#...Q0.exGPOS..~.......7JT...OS/2.......Y...`].z.cmap................gasp................head.......4...6..%}hhea...$...!...$....hmtx............t.).maxp...H.........0P.name................post...x....... ...2..............ideoromn..DFLT..cyrl..grek..latn...................W..............x.c`d```5.R.{fz<..W.f..@.....0....>.....\f.&.(.h...x...n.@.E..IUUB]...D.*e..X.x...T....... l..'(|D.......t..t...4.T.xd....o.m.o..........W......{nR....=|.|.w.-t..YA.5Wy..s....s......|..{nR...!...#|h|.....I.J....L..oK..R\.SS.M.X=....b../l)F......2.I....H.&....!M.H..(._....9......p......E.p;..TJ..c.&..T.{.g.J.{/..$...zJ......v.n.z..rj..fye[..u.]u.'..P..>f0.@....%g....c.h...M\l...R.....c.H.V...v././....|1...0.RU...@N..17..!...UCG...y...sn\.....K..8...n..o.uNqgA.u..yZA]...(N..._...nJ....s......S.@...9..^....!...+.j..a.].g.....l..x.c`fbeV``e``.b.```...q.F..@QnN
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 40248, version 0.0
                                                      Category:dropped
                                                      Size (bytes):40248
                                                      Entropy (8bit):7.989634769609523
                                                      Encrypted:false
                                                      SSDEEP:768:LDFkEGYLN2ySKC2EspJHit0n4ZHtSxGHRT99rgv8sBe9gUR98RzVuppM+2RX2xQ5:L2E7N6u/its45ExGHR/8v8Dg29OzVu/M
                                                      MD5:C26C1B68EDD07AB0069CF2EFE0886C1F
                                                      SHA1:3579AED1FC9953159F817E57E7899849AC94EA85
                                                      SHA-256:72073CA6C71BCC781491B054C4325A663834082457FD896CB6E1E9931BF6E013
                                                      SHA-512:5459372E0DD2056437217F9668C393111C54E3C31FBDCA997E9D06C1DC3519DBA0AB0AB7B1F28A10AE10009AC828AEA9BFC21A2E58185F79E2403FEEEF424E32
                                                      Malicious:false
                                                      Preview:wOFFOTTO...8...............................BASE...D...F...Fe.].CFF ...@..vs........DYNA..z.........d...GDYN..{...."...QZ].BGPOS..|....c..7B....OS/2.......Y...`^B{.cmap...0............gasp................head.......4...6..%phhea.......!...$....hmtx...8..........%.maxp...8.........0P.name...............]post........... ...2..............ideoromn..DFLT..cyrl..grek..latn...................U..............x.c`d```5..,....o....P..|r...........k ....$..Y\.jx...n.0....'E..}..{hZ..8...@29.....~hH....;t.#.......y..@.(.5.!.!....RW.............[x...G....65[.......z~..A.?X...rU......s....#......<{>F...|..2.;X..<.P..1Z....}eu^..bi.)c.WR..L...Vb.+]..l.W...1..e:...,.#.....z<.:.S.:.....E..........P*...c....T..6..T.. .d..HF.....X...v.~......G........9. .Bq\.FX.`.M.c....s..e....h.3v.....8.fH....4gM..+...X..R....Y..KD....D.......?..=N.<..._.........y......C...U....[.....~.lN.~.....W..{.\^;..?.._..a...T...t.....K.Y....}...2..x.c`f.`na`e``.b.```...q.F..@Qn.f&..&&....v.<#..
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 39972, version 0.0
                                                      Category:dropped
                                                      Size (bytes):39972
                                                      Entropy (8bit):7.991697943495219
                                                      Encrypted:true
                                                      SSDEEP:768:/CjC6+7R1Cf1RSIpcme1GO3SgcXFwwSUyaXgofeoUyN+MPv:/Cjh+lQf1xpG3S1XFwwSUyaXgofPqov
                                                      MD5:DF0CD5EDE266E9EA694C3D28209FCE9F
                                                      SHA1:ECCA8585322A40CF1D0A479EBE67597ADF50E69D
                                                      SHA-256:5ECD3C64E4C0D1A51D13E2762BECB9E7DA2ACD30D670058A6B16761BE3E017DB
                                                      SHA-512:B747532E1CDF0C57EF67D45389B61D14ACAF19BC36A9E007189F0F551CBC3D13AD518803A572AB061CB42F129C1AAEEFF25AB066C72CBE4B562841624D5EAE75
                                                      Malicious:false
                                                      Preview:wOFFOTTO...$.......8........................BASE...D...F...Fe$].CFF ...4..t..../.>.PDYNA..y ........c...GDYN..z...."...Q..mGPOS..{@......7v_...OS/2.......Y...`\Wv.cmap................gasp................head.......4...6..%uhhea.......!...$....hmtx...$........P+/kmaxp...,.........0P.name................post........... ...2..............ideoromn..DFLT..cyrl..grek..latn...................\..............x.c`d```5..S.........(.p>94.F......|..ef`....&c..x.RKn.0..9N...Qt.5.v..R 8.Wv..Y%...%..........0...]t.S...@G...M..!q.{3C.Q....<t.o.=.a...^a...>...>9....a.........J.....O.=..b.{.x{......p.......~8|......$.....:..U.h.84F...e].ul.J.I...f..F.u......2.q1..,.#...xr5..m..N]......N..,D..].P*..ii.e...Trx6.....6I(#...z..S]..9Tz.1rY.f....'..U.G..P..D..P".&^....8.,x].....7.....e..sl.F.Jc#.Y..s...Th............aL.....E...t..(;..U...;....,......^H...LJ..g.x.A^[....X.._.g6.kb..}G..%.n.e......}.X....]?g^;~C.^4..t...<...x.c`f|.8.......).....B3.1.1*.E.Y..XX..X......P............
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Web Open Font Format, CFF, length 37480, version 0.0
                                                      Category:dropped
                                                      Size (bytes):37480
                                                      Entropy (8bit):7.989671357448148
                                                      Encrypted:false
                                                      SSDEEP:768:+Fth4mFn+GiKkGQPWdGPgIVw9xRju2H3/Nn/byU:Am+nxiKsPWdGPH+FuVU
                                                      MD5:EE10AE517D40542F597A9E0E2852B52B
                                                      SHA1:D30F8C2467A4689844268B82E0E2ECFE3464CDAE
                                                      SHA-256:ED1815F9829E1F6A710FCDC182613F614F4887E39281E095360BEEC1CCC72348
                                                      SHA-512:A327F9E3B5B9AA8CB13BC118DA5F26AF5C3A8DBB66128F36F18E09EB019A222846694A6A8C13FDC48F0460BC9E79BA7EA9DC8AA9EB8B30F63576448328E83ACB
                                                      Malicious:false
                                                      Preview:wOFFOTTO...h.......T........................BASE...D...F...Fe$].CFF ...8..l....x.Q.DYNA..pT.......|Zh`.GDYN..q<.......9J..uGPOS..rL......3.*^..OS/2.......]...`\Xv.cmap...T.........G.;gasp................head.......4...6.:%Fhhea.......$...$.$..hmtx...T........;..Xmaxp...0.........0P.name...........~n\.hpost...<....... ...2..............ideoromn..DFLT..cyrl..grek..latn...................\..............x.c`d```5...v........(.p>9..F.W...b.|............8x.RKn.0..9...m.U.]..@(Z..8..N...6.$.`}\.1.#....A.=I......"(...>>..;<.C..8[..5w-...G..O.w.Y;|.!>;..[|u..}<R.u_qW.....{K.;x.e......p..o....;....'.;...(u..2.bq...k1+...Ud.J.q..yz.1...ZW{.[.U..bf.,MB.....z2..M...C7..3.RWuZ.....D .R.Mi....Trp6....Zfi..P.C.^.n..]..9..652)s_.gQ.?..`..<@ ..8'.c..14....0.9W..{.0[ag.. .....#..6..v..jr.......M...kFm...._8..k.%S.~.~.N..e.X.......%w.....es.i;...e.=.V-.kr.....9...k8kF..c....Z..W.t....9.;.c~K.C}sj..=u.k.]]..}.7........x.c`f..8.......)....o......`....fefba.dbQ``jg```d..G.'W....
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Unicode text, UTF-8 text, with very long lines (2369)
                                                      Category:dropped
                                                      Size (bytes):18413
                                                      Entropy (8bit):5.5692261470401165
                                                      Encrypted:false
                                                      SSDEEP:384:S12hpIgIVsUGiRm4lIeU4iDFeFs2NdFJsQF+i:SF7GiRm4X0JqsG7Ui
                                                      MD5:CFE609917C9E7D4EED2C80563DED171B
                                                      SHA1:2E5BBD88B040662BF8023FD6A9D55CC760008695
                                                      SHA-256:AD84B43FFD121E46AC4D2FA817B5863E4802C523BC3FB5E864DB28B3DB0E2514
                                                      SHA-512:1F600E1ABF1814C89589462ADE13F2E5399082236829EB45A530C852AE135910CB332D540B228DA744B60241BC74E85A3E5EB60CBC65B860E8E9148AF79C54D7
                                                      Malicious:false
                                                      Preview:/*. * The Typekit service used to deliver this font or fonts for use on websites. * is provided by Adobe and is subject to these Terms of Use. * http://www.adobe.com/products/eulas/tou_typekit. For font license. * information, see the list below.. *. * adobe-clean:. * - http://typekit.com/eulas/000000000000000000017701. * - http://typekit.com/eulas/000000000000000000017702. * - http://typekit.com/eulas/000000000000000000017703. * - http://typekit.com/eulas/0000000000000000000176ff. * - http://typekit.com/eulas/000000000000000000017704. * - http://typekit.com/eulas/000000000000000000017706. *. * . 2009-2024 Adobe Systems Incorporated. All Rights Reserved.. */.if(!window.Typekit)window.Typekit={};window.Typekit.config={"a":"19707152","c":[".tk-adobe-clean","\"adobe-clean\",sans-serif",".tk-adobe-clean-condensed","\"adobe-clean-condensed\",sans-serif"],"fi":[7180,7181,7182,7184,7185,22474],"fc":[{"id":7180,"family":"adobe-clean","src":"https://use.typekit.net/af/cb695f/000000
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:GIF image data, version 89a, 1 x 1
                                                      Category:dropped
                                                      Size (bytes):35
                                                      Entropy (8bit):2.9302005337813077
                                                      Encrypted:false
                                                      SSDEEP:3:CUHaaatrllH5:aB
                                                      MD5:81144D75B3E69E9AA2FA3E9D83A64D03
                                                      SHA1:F0FBC60B50EDF5B2A0B76E0AA0537B76BF346FFC
                                                      SHA-256:9B9265C69A5CC295D1AB0D04E0273B3677DB1A6216CE2CCF4EFC8C277ED84B39
                                                      SHA-512:2D073E10AE40FDE434EB31CBEDD581A35CD763E51FB7048B88CAA5F949B1E6105E37A228C235BC8976E8DB58ED22149CFCCF83B40CE93A28390566A28975744A
                                                      Malicious:false
                                                      Preview:GIF89a.............,..............;
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with very long lines (491), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26886
                                                      Entropy (8bit):3.598336168264256
                                                      Encrypted:false
                                                      SSDEEP:768:UJHlHjrJx4gVdVbYYBOreyVjol/yfisfYFv:U5lHjrJx4gVdVbYYBceyVjol/StYFv
                                                      MD5:8031F01C0D5815F86E7F16E673DC059D
                                                      SHA1:BFEB6524C1DEF5DEC27CB7D4A4CB66E15A8EB8B1
                                                      SHA-256:C95E16811FA92F7C0EA1A46DA803C3A33D6D9B75F9F49F182EE2E3FCE380EC91
                                                      SHA-512:762EE17CC99566CE053168DF7B817235382C1C655F4AB79A51D2EB63855BF3A5A7410A1406369ECF9000F49883874C569023DE83B6E0D538684CDFA48E170BBD
                                                      Malicious:false
                                                      Preview:..1.1./.2.2./.2.4. .0.0.:.1.1.:.2.5.:.8.7.6. .|. .[.I.N.F.O.]. .|. . .|. .A.D.M. .|. . .|. .A.p.p.l.i.c.a.t.i.o.n.C.o.n.t.e.x.t. .|. . .|. . .|. .7.4.0.4. .|. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.D.M. .W.o.r.k.f.l.o.w. .s.t.a.r.t... .V.e.r.s.i.o.n.:. .2...0...0...7.0.2.s. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....1.1./.2.2./.2.4. .0.0.:.1.1.:.2.5.:.8.7.6. .|. .[.T.R.A.C.E.]. .|. . .|. .A.D.M. .|. . .|. .A.p.p.l.i.c.a.t.i.o.n.C.o.n.t.e.x.t. .|. . .|. . .|. .7.4.0.4. .|. .C.o.m.m.a.n.d. .L.i.n.e. .:. .t.e.s.t...e.x.e. .....1.1./.2.2./.2.4. .0.0.:.1.1.:.2.5.:.8.7.6. .|. .[.I.N.F.O.]. .|. . .|. .A.D.M. .|. . .|. .A.p.p.l.i.c.a.t.i.o.n.C.o.n.t.e.x.t. .|. . .|. . .|. .7.4.0.4. .|. .A.d.m.i.n. .a.n.d. .n.o.t. .c.h.i.l.d. .p.r.o.c.e.s.s... .N.o. .n.e.e.d. .f.o.r. .I.P.C.....1.1./.2.2./.2.4. .0.0.:.1.1.:.2.6.:.6.5.8. .|. .[.I.N.F.O.]. .|. . .|. .A.D.M. .|. . .|. .A.p.p.l.i.c.a.t.i.o.n.C.o.n.t.e.x.t. .|. . .|. . .|. .7.4.0.4. .|. .W.h.i.t.e. .l.i.s.t.e.d. .U.R.L.s. .
                                                      Process:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):390
                                                      Entropy (8bit):3.1136621375241704
                                                      Encrypted:false
                                                      SSDEEP:6:QRdOWqnRarVADi6Iy3MCdOWqnRarLgNZSY:Q7OWqnRahAu6xOWqnRafuZ3
                                                      MD5:CA73468830B594BDD1AFE7CC68423B37
                                                      SHA1:89C7050C2179B8BCAB0E1C2180B6AD7BF518CFFE
                                                      SHA-256:EA7619F5E3A99B6BBB3BA2229C24F760A043672904DC2356B3889687D2FFEC8D
                                                      SHA-512:AE16C99E147D9F7FCC6663710E9372A3FEBD54EE2A5553788C4B3F47369035FA17B7D48C4003DAF92DF2A6942F2E773EF64B504716385A736C2C33D8FFAB0E7A
                                                      Malicious:false
                                                      Preview:..1.1./.2.2./.2.4. .0.0.:.1.1.:.3.1.:.3.3.9. .|. .[.I.N.F.O.]. .|. . .|. . .|. . .|. . .|. . .|. . .|. .7.6.3.6. .|. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.s.t.a.r.t. .o.f. .D.o.w.n.l.o.a.d.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....1.1./.2.2./.2.4. .0.0.:.1.1.:.3.1.:.3.3.9. .|. .[.I.N.F.O.]. .|. . .|. . .|. . .|. . .|. . .|. . .|. .7.6.3.6. .|. .G.D.E. .V.e.r.s.i.o.n. .i.s. .2...0...0...1.....
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                      Category:dropped
                                                      Size (bytes):1450040
                                                      Entropy (8bit):7.923308096978353
                                                      Encrypted:false
                                                      SSDEEP:24576:8c+ApDgcz6SWzMi+6iulvI4rTUJOH/akEElC80FN3kxZP+xzkc3ET:8k/SWslrroJOfrEN80moxzr3c
                                                      MD5:E4E96D377207C990295577E0EBD93F79
                                                      SHA1:6C6ED98B484F8A1A145EBE7D900DF36FB4ABC931
                                                      SHA-256:AC6311039D5BFE719198C15577D3EE870185529F9510F5C0DDC066F1C8D8C462
                                                      SHA-512:3DB14A6F3DFA2E2768B1C25A65BC6F48C5DC763D80FEE576CD7D0B21F3ECDCD25C0096B10C947F6B24999C23DF75709604A4DC0FD1D894CDB1B9A556E1E6EAF7
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......F?...^...^...^...,...^...,../^...,...^...,...^.."...^.."...^..".._...^...^..d....^...,...^...#...^...^...]...#..>^...#...^...#7..^...#...^..Rich.^..........PE..L...#X.d...............#.....P...@....C..P....D...@..........................PD...........@......................... .*.l....JD.......D..J..............8*...LD.............................l.C.......C.......................).....................UPX0.....@..............................UPX1.........P......................@....rsrc....P....D..N..................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!....
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):2452992
                                                      Entropy (8bit):6.606309621583536
                                                      Encrypted:false
                                                      SSDEEP:24576:04MRPjr8C5Gi0v4/bplKYFhoFA496+Se7dwSWt+0zvhsCIA8A3RmzlQ68:2Rfr/bqM2XpWAWJ8MKlQ
                                                      MD5:3CF367E01D074E622E14C36FE1685C0A
                                                      SHA1:F9B347B843F438564E606A7D3E273659E0FB7CC7
                                                      SHA-256:2CB0AEA0F3DFE49B99F5F7A0E6F6020413C916E4A21D05D2DF1CCA3DE3E7E91D
                                                      SHA-512:4033D7E17E673EC67947367FED5F5992D578B61A0DA0D24743D03AB0E1BF17F26BCE7F80D5B0D23F87736E3D8C429FD4420BEC708C295D81D125700BBF4AB3A9
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 13%
                                                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......'...c.d.c.d.c.d...`.f.d.c.d.`.d...a.`.d...g.e.d...`.i.d..8....d..8..f.d..8..n.d..[..`.d.c.e.!.d...a.a.d...d.b.d.....b.d.c...b.d...f.b.d.Richc.d.........................PE..d.....>g.........." .......... ......$........................................%...........`.............................................h...h...(.....%.......%.H.............%......................................................................................text............................... ..`.rotext.(F.......H.................. ..`.rodata............................. ..`.rdata..f...........................@..@.data...............................@....pdata..H.....%......Z%.............@..@.gfids........%......b%.............@..@.rodata.X.....%......d%.............@..@.rsrc.........%......f%.............@..@.reloc........%......h%.............@..B........................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: FWojXRpxua, Author: fwRTnJqOge, Keywords: Installer, Comments: This installer database contains the logic and data required to install FWojXRpxua., Template: x64;1033, Revision Number: {73232F59-F6AA-4764-AEA4-731717E1ED5E}, Create Time/Date: Wed Nov 20 20:52:00 2024, Last Saved Time/Date: Wed Nov 20 20:52:00 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                                                      Category:dropped
                                                      Size (bytes):2834432
                                                      Entropy (8bit):7.991420826606059
                                                      Encrypted:true
                                                      SSDEEP:49152:/O05mqQDiCjwnwVv+i2MF/NtSftHFDSy4dx21N+NfSf/wXoCBBUQZcUJ8+mp3gi/:/rABiCjwnwVmGF1t6R1j4dx8Njf/w4C2
                                                      MD5:B9632555B2C19B9182CAB9C098C22D8E
                                                      SHA1:100D612540C51413141F52C3888114CDDB76E9A0
                                                      SHA-256:1164B944F47A9701DDD682F59C60425FAED350647E3F9E562E1ABC140A89C7F2
                                                      SHA-512:B90B26AF09115C4AD37F5CB40135DE51835CCFFBD666168934062FB587A9111FA535E21C1E231AED76A5E871D63A9F71B686367DEFED3D584F6D76F75E5ACB52
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: FWojXRpxua, Author: fwRTnJqOge, Keywords: Installer, Comments: This installer database contains the logic and data required to install FWojXRpxua., Template: x64;1033, Revision Number: {73232F59-F6AA-4764-AEA4-731717E1ED5E}, Create Time/Date: Wed Nov 20 20:52:00 2024, Last Saved Time/Date: Wed Nov 20 20:52:00 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                                                      Category:dropped
                                                      Size (bytes):2834432
                                                      Entropy (8bit):7.991420826606059
                                                      Encrypted:true
                                                      SSDEEP:49152:/O05mqQDiCjwnwVv+i2MF/NtSftHFDSy4dx21N+NfSf/wXoCBBUQZcUJ8+mp3gi/:/rABiCjwnwVmGF1t6R1j4dx8Njf/w4C2
                                                      MD5:B9632555B2C19B9182CAB9C098C22D8E
                                                      SHA1:100D612540C51413141F52C3888114CDDB76E9A0
                                                      SHA-256:1164B944F47A9701DDD682F59C60425FAED350647E3F9E562E1ABC140A89C7F2
                                                      SHA-512:B90B26AF09115C4AD37F5CB40135DE51835CCFFBD666168934062FB587A9111FA535E21C1E231AED76A5E871D63A9F71B686367DEFED3D584F6D76F75E5ACB52
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2400
                                                      Entropy (8bit):5.6314585785076074
                                                      Encrypted:false
                                                      SSDEEP:48:2LPeu8kz7pw0JepUTuSP3Bfxpy21k6xNEbmp4UtGHpWaAeU1DFnToBoEVlt3CX:2Lrpu0JUS5VjxNEb9UtTre6xaoEPlc
                                                      MD5:E32BAF243068F06A2553365E2583DE4C
                                                      SHA1:FB27E7811D8B0CFCF1EE51A5E1EDEC188F037034
                                                      SHA-256:CD291283CC631EA2F02F8A0DFC1A39E54A236296C2C87C9219966720468816A2
                                                      SHA-512:C19F4464A518E82D16F8955844C024839D6E1B6B98CEF55ECD1AAC8D7A90E4D74DC4901685D9F1A6156D78D2AA3B6CDEAEBBA1C73437EF1C88A4EAB9BC782C14
                                                      Malicious:false
                                                      Preview:...@IXOS.@.....@d.uY.@.....@.....@.....@.....@.....@......&.{DD475EBC-D960-4AF4-BB8A-BE91FA942756}..FWojXRpxua..Acrobat_DC_x64_VIP_v10.12.msi.@.....@.....@.....@........&.{73232F59-F6AA-4764-AEA4-731717E1ED5E}.....@.....@.....@.....@.......@.....@.....@.......@......FWojXRpxua......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{CA18E5D1-6D13-4F6E-8DAC-FB15EF2DFD0D}S.C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe.@.......@.....@.....@......&.{55196117-3D71-4100-B339-6770670A36D9}I.C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll.@.......@.....@.....@...........@....&.{00000000-0000-0000-0000-000000000000}.@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@8.;..@.....@......;.C:\Users\user\AppData\Local\Temp\Package Installation Dir\..%.1\y_o6-t3z\
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):20480
                                                      Entropy (8bit):1.1732042294653637
                                                      Encrypted:false
                                                      SSDEEP:12:JSbX72FjlAGiLIlHVRpIh/7777777777777777777777777vDHFfeT3F/yrl0i8Q:JzQI5w9q/7F
                                                      MD5:649A3DE56FE8AE281BFAD7748EE46BB9
                                                      SHA1:98FAB8F7CCCADCA0E20D62D3DC61CD3BCB9F9E2F
                                                      SHA-256:520334E9924A4BB23DBE7CD62A6655889B3E8DF53A35F0826E062A0F5889E249
                                                      SHA-512:C325323B79D627CBA2BE2DCCC4E3E0D05660DC4FD0C1742071AC27F78C79F13A2563079AEA7D43D77A25662136CE79DFB307A81F1E6BFA1891DE22F9071CE993
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):20480
                                                      Entropy (8bit):1.5305406280957934
                                                      Encrypted:false
                                                      SSDEEP:48:L8PhKuRc06WXJ6nT5TWSngoeE9ST4S5oVrQ9ST4SInA:yhK1xnTASg9s9sr
                                                      MD5:5EA175FA2109B6180ADAD4DA15460DA7
                                                      SHA1:F9732F3392CB2CE927869CE1EE6F37788D60F64A
                                                      SHA-256:4279D064C6536B2CA149DDEAA72EBCCE1FD21ED2BD173FD6F1849577E19D140F
                                                      SHA-512:B685D0B82C9D25C6566FD1699DA3CC09FA95A212A7EEBA2383DA669388629F4639F396623C475FD75EE954F970716D40AA2B33F95C34FC0E9C8B12A6CEF0B6DA
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):432221
                                                      Entropy (8bit):5.375174937647703
                                                      Encrypted:false
                                                      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauG:zTtbmkExhMJCIpErL
                                                      MD5:19786CF0013F89C44B43AE5C492C1177
                                                      SHA1:950FF4E4E1F74268CCF8967AA8865F6C494BBB39
                                                      SHA-256:5D44F56AA272D7C311EAA7F33CF7DC84FAAE6F8F6C9B3B9E35C25082C9E449CC
                                                      SHA-512:12C5BEB7704D0F11668F004C95CD5CE57495856BEE997CA9F5B245B4992A89F0F2813E6B63E0CC574888FEDE843B27C5790BDEDDA5F5933BB2B2558A6AFA90B4
                                                      Malicious:false
                                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):32768
                                                      Entropy (8bit):1.2281286952976211
                                                      Encrypted:false
                                                      SSDEEP:48:Y4VCucNveFXJJT5sWSngoeE9ST4S5oVrQ9ST4SInA:3C2xT3Sg9s9sr
                                                      MD5:27D78B2A97F2942ED379F99FD85E6378
                                                      SHA1:44CEAA763B8034B403AFE642813B0DA073B23A91
                                                      SHA-256:0D71A45DD4114357941BF8CDDA4B3F56FA1E3915AC48E64EFDE9F670642CBCEB
                                                      SHA-512:EC89BB31E788AD0EA14B862B30D1B395B586B92FC9DC5E97CE8769D0A1E2EFB1656DF8F85B9FD09DFC273933E8B7942AC6DA89AC4B0EDCA2222BD80EE1CF4EF9
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):32768
                                                      Entropy (8bit):1.2281286952976211
                                                      Encrypted:false
                                                      SSDEEP:48:Y4VCucNveFXJJT5sWSngoeE9ST4S5oVrQ9ST4SInA:3C2xT3Sg9s9sr
                                                      MD5:27D78B2A97F2942ED379F99FD85E6378
                                                      SHA1:44CEAA763B8034B403AFE642813B0DA073B23A91
                                                      SHA-256:0D71A45DD4114357941BF8CDDA4B3F56FA1E3915AC48E64EFDE9F670642CBCEB
                                                      SHA-512:EC89BB31E788AD0EA14B862B30D1B395B586B92FC9DC5E97CE8769D0A1E2EFB1656DF8F85B9FD09DFC273933E8B7942AC6DA89AC4B0EDCA2222BD80EE1CF4EF9
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):512
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                      Malicious:false
                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):32768
                                                      Entropy (8bit):0.0785955619753621
                                                      Encrypted:false
                                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOG+eT3PZl9vYSIiVky6l51:2F0i8n0itFzDHFfeT3F/yr
                                                      MD5:A2333A8EC90D63A56D2F45EC8F69063B
                                                      SHA1:A650B9628485889B714E4FF3F075A07BE6697697
                                                      SHA-256:9DC781F715FA46C8810595D2BF3F60B2A788AAA08248705B2E64CDA62B243E93
                                                      SHA-512:EDBC08EFB148C100778881671FAEA6AFD0CFA1B9CA8F8124E493047CEC183267A73AE2F86DEA83A21362A64341D97F474A7AEBFE491339024539FAC68C619A41
                                                      Malicious:false
                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):512
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                      Malicious:false
                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):20480
                                                      Entropy (8bit):1.5305406280957934
                                                      Encrypted:false
                                                      SSDEEP:48:L8PhKuRc06WXJ6nT5TWSngoeE9ST4S5oVrQ9ST4SInA:yhK1xnTASg9s9sr
                                                      MD5:5EA175FA2109B6180ADAD4DA15460DA7
                                                      SHA1:F9732F3392CB2CE927869CE1EE6F37788D60F64A
                                                      SHA-256:4279D064C6536B2CA149DDEAA72EBCCE1FD21ED2BD173FD6F1849577E19D140F
                                                      SHA-512:B685D0B82C9D25C6566FD1699DA3CC09FA95A212A7EEBA2383DA669388629F4639F396623C475FD75EE954F970716D40AA2B33F95C34FC0E9C8B12A6CEF0B6DA
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):20480
                                                      Entropy (8bit):1.5305406280957934
                                                      Encrypted:false
                                                      SSDEEP:48:L8PhKuRc06WXJ6nT5TWSngoeE9ST4S5oVrQ9ST4SInA:yhK1xnTASg9s9sr
                                                      MD5:5EA175FA2109B6180ADAD4DA15460DA7
                                                      SHA1:F9732F3392CB2CE927869CE1EE6F37788D60F64A
                                                      SHA-256:4279D064C6536B2CA149DDEAA72EBCCE1FD21ED2BD173FD6F1849577E19D140F
                                                      SHA-512:B685D0B82C9D25C6566FD1699DA3CC09FA95A212A7EEBA2383DA669388629F4639F396623C475FD75EE954F970716D40AA2B33F95C34FC0E9C8B12A6CEF0B6DA
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):512
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                      Malicious:false
                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):512
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                      Malicious:false
                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):512
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3::
                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                      Malicious:false
                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):69632
                                                      Entropy (8bit):0.13020342250802835
                                                      Encrypted:false
                                                      SSDEEP:24:VDAHca29SMClt4ipVlF+/CWneE9SMClt4ipV7V2BwGhlrkgri+2Ho9wh:BAp29ST4S9oeE9ST4S5oVr2nIW
                                                      MD5:79A4BF63F3D53CADD4CA640D8E1BD388
                                                      SHA1:A3E1C6B81F8ECF053F9C36024624D38D9A864E22
                                                      SHA-256:DF3ED01DEF3DB5AB7142AC5FA9FAC0DC3E472D2E564F94D5FAA96DA080FECD44
                                                      SHA-512:969023A92792FC2A91EC06EA23737340C77693233EE6BA1FB5A9F4D5318C082F9ABE2296D6E63EA86844CBB12144097417B5C0223EF9406FCF4D810CB859AA0D
                                                      Malicious:false
                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\System32\msiexec.exe
                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                      Category:dropped
                                                      Size (bytes):32768
                                                      Entropy (8bit):1.2281286952976211
                                                      Encrypted:false
                                                      SSDEEP:48:Y4VCucNveFXJJT5sWSngoeE9ST4S5oVrQ9ST4SInA:3C2xT3Sg9s9sr
                                                      MD5:27D78B2A97F2942ED379F99FD85E6378
                                                      SHA1:44CEAA763B8034B403AFE642813B0DA073B23A91
                                                      SHA-256:0D71A45DD4114357941BF8CDDA4B3F56FA1E3915AC48E64EFDE9F670642CBCEB
                                                      SHA-512:EC89BB31E788AD0EA14B862B30D1B395B586B92FC9DC5E97CE8769D0A1E2EFB1656DF8F85B9FD09DFC273933E8B7942AC6DA89AC4B0EDCA2222BD80EE1CF4EF9
                                                      Malicious:false
                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: FWojXRpxua, Author: fwRTnJqOge, Keywords: Installer, Comments: This installer database contains the logic and data required to install FWojXRpxua., Template: x64;1033, Revision Number: {73232F59-F6AA-4764-AEA4-731717E1ED5E}, Create Time/Date: Wed Nov 20 20:52:00 2024, Last Saved Time/Date: Wed Nov 20 20:52:00 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                                                      Entropy (8bit):7.991420826606059
                                                      TrID:
                                                      • Microsoft Windows Installer (60509/1) 88.31%
                                                      • Generic OLE2 / Multistream Compound File (8008/1) 11.69%
                                                      File name:Acrobat_DC_x64_VIP_v10.12.msi
                                                      File size:2'834'432 bytes
                                                      MD5:b9632555b2c19b9182cab9c098c22d8e
                                                      SHA1:100d612540c51413141f52c3888114cddb76e9a0
                                                      SHA256:1164b944f47a9701ddd682f59c60425faed350647e3f9e562e1abc140a89c7f2
                                                      SHA512:b90b26af09115c4ad37f5cb40135de51835ccffbd666168934062fb587a9111fa535e21c1e231aed76a5e871d63a9f71b686367defed3d584f6d76f75e5acb52
                                                      SSDEEP:49152:/O05mqQDiCjwnwVv+i2MF/NtSftHFDSy4dx21N+NfSf/wXoCBBUQZcUJ8+mp3gi/:/rABiCjwnwVmGF1t6R1j4dx8Njf/w4C2
                                                      TLSH:CDD5339471DA5B33F28F89BD1706A1820B2D7D390EDB6A53B1E43937303639E9E568D0
                                                      File Content Preview:........................>......................................................................................................................................................................................................................................
                                                      Icon Hash:2d2e3797b32b2b99
                                                      No network behavior found

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:23:03:06
                                                      Start date:21/11/2024
                                                      Path:C:\Windows\System32\msiexec.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Acrobat_DC_x64_VIP_v10.12.msi"
                                                      Imagebase:0x7ff700e00000
                                                      File size:69'632 bytes
                                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:23:03:06
                                                      Start date:21/11/2024
                                                      Path:C:\Windows\System32\msiexec.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                                      Imagebase:0x7ff700e00000
                                                      File size:69'632 bytes
                                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:2
                                                      Start time:23:03:07
                                                      Start date:21/11/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\Temp\Package Installation Dir\Reader_Install_Setup.exe"
                                                      Imagebase:0xb30000
                                                      File size:1'450'040 bytes
                                                      MD5 hash:E4E96D377207C990295577E0EBD93F79
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 5%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:3
                                                      Start time:23:03:07
                                                      Start date:21/11/2024
                                                      Path:C:\Windows\System32\rundll32.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"rundll32.exe" "C:\Users\user\AppData\Local\Temp\Package Installation Dir\qpgEZsswIP.dll",DllRegisterServer
                                                      Imagebase:0x7ff71d3a0000
                                                      File size:71'680 bytes
                                                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_BumbleBee, Description: Yara detected BumbleBee, Source: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Bumblebee_35f50bea, Description: unknown, Source: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:17.4%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:42.7%
                                                        Total number of Nodes:1278
                                                        Total number of Limit Nodes:35
                                                        execution_graph 24042 d28d30 24043 d28d42 24042->24043 24047 d28d5a 24042->24047 24104 d0d47c 14 API calls __dosmaperr 24043->24104 24044 d290b0 24113 d0d47c 14 API calls __dosmaperr 24044->24113 24047->24044 24048 d28da0 24047->24048 24049 d28dab 24048->24049 24050 d28d47 24048->24050 24054 d28ddb 24048->24054 24105 d0d47c 14 API calls __dosmaperr 24049->24105 24052 d28db0 24114 d0d30d 41 API calls _memcpy_s 24052->24114 24055 d28df4 24054->24055 24056 d28e0e 24054->24056 24060 d28e3f std::_Locinfo::_Locinfo_dtor 24054->24060 24055->24056 24059 d28df9 24055->24059 24106 d0d47c 14 API calls __dosmaperr 24056->24106 24058 d28e13 24107 d0d30d 41 API calls _memcpy_s 24058->24107 24099 d31206 24059->24099 24062 d24ed8 ___free_lconv_mon 2 API calls 24060->24062 24064 d28e59 24062->24064 24063 d28f8c 24066 d29000 24063->24066 24069 d28fa5 GetConsoleMode 24063->24069 24067 d24ed8 ___free_lconv_mon 2 API calls 24064->24067 24068 d29004 ReadFile 24066->24068 24070 d28e60 24067->24070 24071 d29078 GetLastError 24068->24071 24072 d2901c 24068->24072 24069->24066 24073 d28fb6 24069->24073 24074 d28e85 24070->24074 24075 d28e6a 24070->24075 24076 d29085 24071->24076 24077 d28fdc 24071->24077 24072->24071 24078 d28ff5 24072->24078 24073->24068 24079 d28fbc ReadConsoleW 24073->24079 24093 d292d6 24074->24093 24108 d0d47c 14 API calls __dosmaperr 24075->24108 24112 d0d47c 14 API calls __dosmaperr 24076->24112 24090 d28e25 __wsopen_s 24077->24090 24109 d0d435 14 API calls __dosmaperr 24077->24109 24086 d29041 24078->24086 24087 d29058 24078->24087 24078->24090 24079->24078 24082 d28fd6 GetLastError 24079->24082 24080 d24ed8 ___free_lconv_mon 2 API calls 24080->24050 24082->24077 24110 d28a4a 46 API calls 2 library calls 24086->24110 24088 d29071 24087->24088 24087->24090 24111 d288a2 44 API calls __wsopen_s 24088->24111 24090->24080 24092 d29076 24092->24090 24094 d292ea _memcpy_s 24093->24094 24095 d291f5 __wsopen_s 43 API calls 24094->24095 24096 d292ff 24095->24096 24097 d0d049 _memcpy_s 41 API calls 24096->24097 24098 d2930e 24097->24098 24098->24059 24101 d31220 24099->24101 24102 d31213 24099->24102 24100 d3122c 24100->24063 24101->24100 24115 d0d30d 41 API calls _memcpy_s 24101->24115 24102->24063 24104->24050 24105->24052 24106->24058 24107->24090 24108->24090 24109->24090 24110->24090 24111->24092 24112->24090 24113->24052 24114->24050 24115->24102 22630 b42280 22631 b4228d 22630->22631 22632 b422af 22630->22632 22633 b422a8 22631->22633 22637 b42310 22631->22637 22644 b37ea0 InitializeCriticalSectionAndSpinCount GetLastError LocalAlloc LocalFree RaiseException 22632->22644 22636 b422b9 22638 b42329 22637->22638 22642 b42337 22637->22642 22650 b42530 46 API calls 2 library calls 22638->22650 22640 b42363 22640->22633 22641 b42331 22641->22633 22642->22640 22645 b424f0 22642->22645 22644->22636 22646 b42504 22645->22646 22649 b42517 22646->22649 22651 b425e0 5 API calls _Yarn 22646->22651 22648 b42527 22649->22640 22650->22641 22651->22648 22652 b463f0 22653 b46401 22652->22653 22654 b463fa 22652->22654 22657 b46d70 22653->22657 22658 b46dc0 std::_Facet_Register 22657->22658 22675 b985c0 22658->22675 22660 b46e13 22661 b46e25 22660->22661 23198 d0cfe6 22660->23198 22687 b3b690 22661->22687 22664 b46e9d 22692 b43bb0 22664->22692 22666 b46f29 CloseHandle 22667 b46f3a 22666->22667 23201 b3b8a0 22667->23201 22669 b46eeb 22669->22666 22669->22667 22670 b46f4d 23206 b3c450 22670->23206 22672 b46f65 std::ios_base::_Ios_base_dtor 23211 d052e7 22672->23211 22674 b46406 23218 bbb836 22675->23218 22677 b985df CoCreateGuid StringFromGUID2 22678 b98608 std::ios_base::_Ios_base_dtor 22677->22678 22679 b9860f 22678->22679 22680 b98651 22678->22680 23220 b3b930 22679->23220 22681 d052e7 _ValidateLocalCookies 5 API calls 22680->22681 22682 b98660 22681->22682 22682->22660 22684 b9863e 22685 d052e7 _ValidateLocalCookies 5 API calls 22684->22685 22686 b9864d 22685->22686 22686->22660 22689 b3b6ba 22687->22689 22688 b3b6d6 _Yarn 22688->22664 22689->22688 23237 b3c260 42 API calls 3 library calls 22689->23237 22691 b3b717 _Yarn 22691->22664 22693 b43c39 22692->22693 22694 b3b690 42 API calls 22693->22694 22695 b43c5a 22694->22695 22696 b3b690 42 API calls 22695->22696 22697 b43c73 22696->22697 22698 b3b690 42 API calls 22697->22698 22699 b43c8c std::_Facet_Register 22698->22699 23238 b47220 22699->23238 22701 b43cf3 22702 b3b690 42 API calls 22701->22702 22703 b43d16 22702->22703 22704 b3b690 42 API calls 22703->22704 22706 b43d48 22704->22706 22705 b44005 22707 b44038 22705->22707 22708 b46188 22705->22708 22706->22705 22709 b43e6c 22706->22709 22710 b3b8a0 41 API calls 22706->22710 23241 b3fa70 22707->23241 22711 b38570 155 API calls 22708->22711 22714 b3b8a0 41 API calls 22709->22714 22721 b43e91 22709->22721 22710->22709 22715 b461f5 22711->22715 22713 b44086 CreateEventW CreateEventW 22717 b440d4 22713->22717 22714->22721 22716 b46225 22715->22716 22718 b3b930 42 API calls 22715->22718 22719 b4624f 22716->22719 22723 b3b930 42 API calls 22716->22723 23255 b980d0 WideCharToMultiByte 22717->23255 22718->22716 22725 b3b8a0 41 API calls 22719->22725 22721->22705 23330 b46fd0 RaiseException 22721->23330 22723->22719 22724 b44144 22727 b44325 22724->22727 22728 b4414f 22724->22728 22729 b4625e 22725->22729 22726 b43edf 22730 b43ef6 22726->22730 22734 b3b8a0 41 API calls 22726->22734 22733 b980d0 45 API calls 22727->22733 22731 b38570 155 API calls 22728->22731 22732 b3b8a0 41 API calls 22729->22732 22735 b3b8a0 41 API calls 22730->22735 22746 b44154 22731->22746 22736 b4626d 22732->22736 22737 b44382 22733->22737 22734->22730 22738 b43f2f 22735->22738 22739 b3b8a0 41 API calls 22736->22739 23268 b42c70 22737->23268 23331 b46fd0 RaiseException 22738->23331 22742 b46290 22739->22742 22744 b3b8a0 41 API calls 22742->22744 22743 b43f4b 22745 b43f62 22743->22745 22749 b3b8a0 41 API calls 22743->22749 22747 b4629f 22744->22747 22750 b3b8a0 41 API calls 22745->22750 22760 b38570 155 API calls 22746->22760 22751 b3b8a0 41 API calls 22747->22751 22748 b443ab 22752 b3b930 42 API calls 22748->22752 22757 b443b8 22748->22757 22749->22745 22753 b43f9b 22750->22753 22754 b462ae 22751->22754 22752->22757 23332 b46fd0 RaiseException 22753->23332 22756 b3c450 41 API calls 22754->22756 22762 b462d9 std::ios_base::_Ios_base_dtor 22756->22762 22758 b44630 22757->22758 22759 b4442e GetLastError 22757->22759 23320 b38570 22758->23320 22763 b38570 155 API calls 22759->22763 22765 b441dd 22760->22765 22761 b43fb5 22767 b43fcc 22761->22767 22773 b3b8a0 41 API calls 22761->22773 22776 b3b8a0 41 API calls 22762->22776 22768 b4443b 22763->22768 22766 b4420d 22765->22766 22770 b3b930 42 API calls 22765->22770 22771 b44237 22766->22771 22772 b4421d 22766->22772 22774 b3b8a0 41 API calls 22767->22774 23334 b42960 42 API calls _ValidateLocalCookies 22768->23334 22770->22766 22777 b3b8a0 41 API calls 22771->22777 22775 b3b930 42 API calls 22772->22775 22773->22767 22774->22705 22775->22771 22778 b462f8 22776->22778 22779 b44246 22777->22779 22785 b3b8a0 41 API calls 22778->22785 22782 b3b8a0 41 API calls 22779->22782 22781 b44464 22790 b38570 155 API calls 22781->22790 22786 b44255 CloseHandle CloseHandle 22782->22786 22783 b44675 GetLastError 22787 b38570 155 API calls 22783->22787 22784 b4488b 22796 b448d1 GetLastError 22784->22796 22797 b44adf 22784->22797 22788 b46307 22785->22788 23333 b41ff0 42 API calls 2 library calls 22786->23333 22791 b44682 22787->22791 22792 b3b8a0 41 API calls 22788->22792 22794 b44499 22790->22794 23337 b42960 42 API calls _ValidateLocalCookies 22791->23337 22795 b46316 22792->22795 22793 b44296 22798 b3b8a0 41 API calls 22793->22798 22799 b444c9 22794->22799 22803 b3b930 42 API calls 22794->22803 22800 b3b8a0 41 API calls 22795->22800 22801 b38570 155 API calls 22796->22801 22810 b44b43 GetLastError 22797->22810 22921 b44d63 22797->22921 22802 b442a5 22798->22802 22804 b444f3 22799->22804 22805 b444d9 22799->22805 22807 b46325 22800->22807 22808 b448de 22801->22808 22809 b3b8a0 41 API calls 22802->22809 22803->22799 22813 b3b8a0 41 API calls 22804->22813 22811 b3b930 42 API calls 22805->22811 22819 d052e7 _ValidateLocalCookies 5 API calls 22807->22819 23340 b42960 42 API calls _ValidateLocalCookies 22808->23340 22814 b442b4 22809->22814 22816 b38570 155 API calls 22810->22816 22811->22804 22812 b446ab 22827 b38570 155 API calls 22812->22827 22818 b44502 22813->22818 22815 b3b8a0 41 API calls 22814->22815 22821 b442c3 22815->22821 22822 b44b50 22816->22822 22817 b44f60 22831 b44f82 22817->22831 22875 b4518f 22817->22875 22823 b3b8a0 41 API calls 22818->22823 22824 b4633e 22819->22824 22826 b3b8a0 41 API calls 22821->22826 23343 b42960 42 API calls _ValidateLocalCookies 22822->23343 22829 b44511 CloseHandle CloseHandle 22823->22829 22824->22669 22825 b44907 22843 b38570 155 API calls 22825->22843 22830 b442d2 22826->22830 22832 b446e8 22827->22832 22828 b46342 22842 b3b8a0 41 API calls 22828->22842 22833 b44533 22829->22833 22835 b3c450 41 API calls 22830->22835 22836 b38570 155 API calls 22831->22836 22838 b44718 22832->22838 22839 b3b930 42 API calls 22832->22839 23335 b41ff0 42 API calls 2 library calls 22833->23335 22844 b442fd std::ios_base::_Ios_base_dtor 22835->22844 22845 b44f87 GetLastError 22836->22845 22840 b44742 22838->22840 22841 b44728 22838->22841 22839->22838 22849 b3b8a0 41 API calls 22840->22849 22847 b3b930 42 API calls 22841->22847 22848 b4638e 22842->22848 22851 b4493c 22843->22851 22859 b3b8a0 41 API calls 22844->22859 23347 b42960 42 API calls _ValidateLocalCookies 22845->23347 22846 b44b79 22860 b38570 155 API calls 22846->22860 22847->22840 22852 b3c450 41 API calls 22848->22852 22853 b44751 22849->22853 22855 b4496c 22851->22855 22862 b3b930 42 API calls 22851->22862 22857 b463a9 std::ios_base::_Ios_base_dtor 22852->22857 22858 b3b8a0 41 API calls 22853->22858 22854 b44563 23336 b41ff0 42 API calls 2 library calls 22854->23336 22863 b44996 22855->22863 22864 b4497c 22855->22864 22879 b3b8a0 41 API calls 22857->22879 22866 b44760 CloseHandle CloseHandle 22858->22866 22867 b4431c 22859->22867 22868 b44bb6 22860->22868 22862->22855 22872 b3b8a0 41 API calls 22863->22872 22870 b3b930 42 API calls 22864->22870 22889 b4478e 22866->22889 22867->22778 22873 b44be6 22868->22873 22881 b3b930 42 API calls 22868->22881 22869 b44572 22876 b3b8a0 41 API calls 22869->22876 22870->22863 22871 b44fb6 22894 b38570 155 API calls 22871->22894 22877 b449a5 22872->22877 22882 b44bf6 22873->22882 22883 b44c10 22873->22883 22874 b4550d GetLastError 22884 b38570 155 API calls 22874->22884 22875->22874 22899 b45737 WaitForMultipleObjects 22875->22899 22900 b452c1 GetLastError 22875->22900 22885 b44581 22876->22885 22886 b3b8a0 41 API calls 22877->22886 22878 b3fa70 42 API calls 22878->22921 22888 b463c1 22879->22888 22881->22873 22890 b3b930 42 API calls 22882->22890 22891 b3b8a0 41 API calls 22883->22891 22892 b4551e GetLastError 22884->22892 22893 b3b8a0 41 API calls 22885->22893 22887 b449b4 CloseHandle CloseHandle 22886->22887 22909 b449e2 22887->22909 22896 b3b8a0 41 API calls 22888->22896 23338 b41ff0 42 API calls 2 library calls 22889->23338 22890->22883 22897 b44c1f 22891->22897 22905 b4553f 22892->22905 22898 b44590 22893->22898 22895 b44ff3 22894->22895 22901 b45023 22895->22901 22908 b3b930 42 API calls 22895->22908 22903 b463cd 22896->22903 22904 b3b8a0 41 API calls 22897->22904 22906 b3b8a0 41 API calls 22898->22906 22949 b45788 22899->22949 22900->22875 22907 b452d8 22900->22907 22910 b45033 22901->22910 22911 b4504d 22901->22911 22912 b3b8a0 41 API calls 22903->22912 22914 b44c2e CloseHandle CloseHandle 22904->22914 23353 b42960 42 API calls _ValidateLocalCookies 22905->23353 22916 b4459f 22906->22916 22917 b38570 155 API calls 22907->22917 22908->22901 23341 b41ff0 42 API calls 2 library calls 22909->23341 22919 b3b930 42 API calls 22910->22919 22920 b3b8a0 41 API calls 22911->22920 22922 b463db 22912->22922 22945 b44c54 22914->22945 22925 b3b8a0 41 API calls 22916->22925 22918 b452dd 22917->22918 23350 b42960 42 API calls _ValidateLocalCookies 22918->23350 22919->22911 22927 b4505c 22920->22927 22921->22817 22921->22828 22921->22878 22928 b3b8a0 41 API calls 22921->22928 23346 b3fd30 42 API calls _Yarn 22921->23346 22922->22669 22923 b447be 23339 b41ff0 42 API calls 2 library calls 22923->23339 22924 b45555 22935 b38570 155 API calls 22924->22935 22926 b445ae 22925->22926 22930 b3c450 41 API calls 22926->22930 22932 b3b8a0 41 API calls 22927->22932 22928->22921 22936 b445d9 std::ios_base::_Ios_base_dtor 22930->22936 22939 b4506b CloseHandle CloseHandle 22932->22939 22933 b447cd 22940 b3b8a0 41 API calls 22933->22940 22934 b45aa2 22966 b45b06 GetLastError 22934->22966 22967 b45b7c GetLastError 22934->22967 22941 b45592 22935->22941 22953 b3b8a0 41 API calls 22936->22953 22938 b44a12 23342 b41ff0 42 API calls 2 library calls 22938->23342 22999 b45091 22939->22999 22944 b447dc 22940->22944 22946 b455c2 22941->22946 22952 b3b930 42 API calls 22941->22952 22942 b4530a 22961 b38570 155 API calls 22942->22961 22948 b3b8a0 41 API calls 22944->22948 23344 b41ff0 42 API calls 2 library calls 22945->23344 22954 b455d2 22946->22954 22955 b455ec 22946->22955 22947 b44a21 22956 b3b8a0 41 API calls 22947->22956 22957 b447eb 22948->22957 22949->22934 22950 b45931 22949->22950 22951 b4588e MultiByteToWideChar 22949->22951 22964 b45a9b 22950->22964 22974 b4594c 22950->22974 22975 b4594e PathFileExistsW 22950->22975 22959 b458c6 22951->22959 22952->22946 22960 b445f8 22953->22960 22962 b3b930 42 API calls 22954->22962 22963 b3b8a0 41 API calls 22955->22963 22965 b44a30 22956->22965 22968 b3b8a0 41 API calls 22957->22968 22980 b458ee MultiByteToWideChar 22959->22980 22970 b3b8a0 41 API calls 22960->22970 22971 b45347 22961->22971 22962->22955 22973 b455fb 22963->22973 22972 d0cfe6 __freea 2 API calls 22964->22972 22976 b3b8a0 41 API calls 22965->22976 23024 b45b15 22966->23024 23060 b45b6e 22966->23060 23356 b42960 42 API calls _ValidateLocalCookies 22967->23356 22977 b447fa 22968->22977 22969 b44c96 23345 b41ff0 42 API calls 2 library calls 22969->23345 22981 b44607 22970->22981 22982 b45377 22971->22982 22993 b3b930 42 API calls 22971->22993 22972->22934 22983 b3b8a0 41 API calls 22973->22983 22974->22975 22984 b459ea 22975->22984 22985 b4595d PathFileExistsW 22975->22985 22986 b44a3f 22976->22986 22988 b3b8a0 41 API calls 22977->22988 22991 b3b930 42 API calls 22980->22991 22992 b3b8a0 41 API calls 22981->22992 22994 b45387 22982->22994 22995 b453a1 22982->22995 22996 b4560a CloseHandle CloseHandle 22983->22996 23002 b459fd CreateFileW 22984->23002 22985->22984 23010 b45978 PathIsDirectoryW 22985->23010 22998 b3b8a0 41 API calls 22986->22998 22987 b45ca9 23000 b38570 155 API calls 22987->23000 23001 b44809 22988->23001 22989 b45b8f 23016 b38570 155 API calls 22989->23016 22990 b44ca5 23004 b3b8a0 41 API calls 22990->23004 23005 b45926 22991->23005 23006 b44616 22992->23006 22993->22982 23007 b3b930 42 API calls 22994->23007 23008 b3b8a0 41 API calls 22995->23008 23066 b4562f 22996->23066 23009 b44a4e 22998->23009 23011 b3b8a0 41 API calls 22999->23011 23044 b45cb1 23000->23044 23013 b3c450 41 API calls 23001->23013 23002->22964 23003 b45a21 WriteFile 23002->23003 23014 b45a44 23003->23014 23015 b45a8f CloseHandle 23003->23015 23017 b44cb4 23004->23017 23018 d0cfe6 __freea 2 API calls 23005->23018 23019 b3b8a0 41 API calls 23006->23019 23007->22995 23020 b453b0 23008->23020 23021 b3b8a0 41 API calls 23009->23021 23033 b4599d 23010->23033 23034 b4599f DeleteFileW 23010->23034 23023 b450e2 23011->23023 23012 b3b690 42 API calls 23025 b45c9a 23012->23025 23027 b44834 std::ios_base::_Ios_base_dtor 23013->23027 23014->23015 23037 b45a58 CreateFileW 23014->23037 23015->22964 23028 b45bcc 23016->23028 23029 b3b8a0 41 API calls 23017->23029 23018->22950 23030 b44625 23019->23030 23031 b3b8a0 41 API calls 23020->23031 23032 b44a5d 23021->23032 23348 b41ff0 42 API calls 2 library calls 23023->23348 23054 b3b930 42 API calls 23024->23054 23357 b43040 155 API calls _ValidateLocalCookies 23025->23357 23026 b46073 CloseHandle CloseHandle 23045 b46092 23026->23045 23046 b3b8a0 41 API calls 23027->23046 23038 b45bfc 23028->23038 23048 b3b930 42 API calls 23028->23048 23039 b44cc3 23029->23039 23030->22807 23040 b453bf CloseHandle CloseHandle 23031->23040 23041 b3c450 41 API calls 23032->23041 23033->23034 23034->22984 23042 b459ab GetLastError 23034->23042 23037->23015 23047 b45a7c FlushFileBuffers CloseHandle 23037->23047 23049 b45c26 23038->23049 23056 b3b930 42 API calls 23038->23056 23050 b3b8a0 41 API calls 23039->23050 23098 b453e4 23040->23098 23051 b44a88 std::ios_base::_Ios_base_dtor 23041->23051 23042->22984 23043 b450f1 23349 b41ff0 42 API calls 2 library calls 23043->23349 23044->23026 23061 b45d11 GetLastError 23044->23061 23062 b45df9 23044->23062 23076 b3b8a0 41 API calls 23045->23076 23055 b44853 23046->23055 23047->23015 23048->23038 23057 b3b8a0 41 API calls 23049->23057 23058 b44cd2 23050->23058 23074 b3b8a0 41 API calls 23051->23074 23054->23060 23063 b3b8a0 41 API calls 23055->23063 23056->23049 23064 b45c35 23057->23064 23065 b3b8a0 41 API calls 23058->23065 23059 b45100 23067 b3b8a0 41 API calls 23059->23067 23060->22987 23060->23012 23068 b45d24 23061->23068 23072 b45e00 CertGetIssuerCertificateFromStore 23062->23072 23069 b44862 23063->23069 23070 b3b8a0 41 API calls 23064->23070 23071 b44ce1 23065->23071 23073 b3b8a0 41 API calls 23066->23073 23075 b4510f 23067->23075 23358 b42960 42 API calls _ValidateLocalCookies 23068->23358 23077 b3b8a0 41 API calls 23069->23077 23078 b45c44 23070->23078 23079 b3c450 41 API calls 23071->23079 23072->23072 23080 b45e23 CertGetNameStringW 23072->23080 23081 b4568a 23073->23081 23082 b44aa7 23074->23082 23083 b3b8a0 41 API calls 23075->23083 23085 b460cc 23076->23085 23086 b44871 23077->23086 23087 b38570 155 API calls 23078->23087 23088 b44d0c std::ios_base::_Ios_base_dtor 23079->23088 23089 b45e6c LocalAlloc 23080->23089 23111 b45ec4 23080->23111 23354 b41ff0 42 API calls 2 library calls 23081->23354 23091 b3b8a0 41 API calls 23082->23091 23092 b4511e 23083->23092 23094 b3b8a0 41 API calls 23085->23094 23095 b3b8a0 41 API calls 23086->23095 23096 b45c49 GetLastError 23087->23096 23109 b3b8a0 41 API calls 23088->23109 23097 b45e82 CertGetNameStringW 23089->23097 23089->23111 23100 b44ab6 23091->23100 23101 b3b8a0 41 API calls 23092->23101 23093 b45d44 23115 b38570 155 API calls 23093->23115 23103 b460db 23094->23103 23095->23030 23096->23060 23104 b45ea1 23097->23104 23119 b3b8a0 41 API calls 23098->23119 23099 b45699 23355 b41ff0 42 API calls 2 library calls 23099->23355 23106 b3b8a0 41 API calls 23100->23106 23102 b4512d 23101->23102 23107 b3b8a0 41 API calls 23102->23107 23359 b41ff0 42 API calls 2 library calls 23103->23359 23104->23104 23118 b3b930 42 API calls 23104->23118 23113 b44ac5 23106->23113 23114 b4513c 23107->23114 23117 b44d2b 23109->23117 23110 b45dea 23131 b3b8a0 41 API calls 23110->23131 23111->23110 23120 b38570 155 API calls 23111->23120 23112 b456a8 23121 b3b8a0 41 API calls 23112->23121 23122 b3b8a0 41 API calls 23113->23122 23126 b3c450 41 API calls 23114->23126 23127 b45d81 23115->23127 23116 b460ea 23360 b41ff0 42 API calls 2 library calls 23116->23360 23129 b3b8a0 41 API calls 23117->23129 23130 b45ebd LocalFree 23118->23130 23123 b45431 23119->23123 23124 b45f02 23120->23124 23125 b456b7 23121->23125 23122->23030 23351 b41ff0 42 API calls 2 library calls 23123->23351 23146 b38570 155 API calls 23124->23146 23133 b3b8a0 41 API calls 23125->23133 23134 b45167 std::ios_base::_Ios_base_dtor 23126->23134 23135 b45db1 23127->23135 23140 b3b930 42 API calls 23127->23140 23137 b44d3a 23129->23137 23130->23111 23131->23026 23139 b456c6 23133->23139 23154 b3b8a0 41 API calls 23134->23154 23142 b45dc1 23135->23142 23143 b45ddb 23135->23143 23136 b460f9 23141 b3b8a0 41 API calls 23136->23141 23144 b3b8a0 41 API calls 23137->23144 23138 b45440 23352 b41ff0 42 API calls 2 library calls 23138->23352 23147 b3b8a0 41 API calls 23139->23147 23140->23135 23148 b46108 23141->23148 23149 b3b930 42 API calls 23142->23149 23150 b3b8a0 41 API calls 23143->23150 23151 b44d49 23144->23151 23174 b45f30 23146->23174 23153 b456d5 23147->23153 23155 b3b8a0 41 API calls 23148->23155 23149->23143 23150->23110 23156 b3b8a0 41 API calls 23151->23156 23152 b4544f 23157 b3b8a0 41 API calls 23152->23157 23158 b3b8a0 41 API calls 23153->23158 23154->22867 23159 b46117 23155->23159 23156->23030 23160 b4545e 23157->23160 23161 b456e4 23158->23161 23162 b3b8a0 41 API calls 23159->23162 23163 b3b8a0 41 API calls 23160->23163 23164 b3c450 41 API calls 23161->23164 23165 b46126 23162->23165 23166 b4546d 23163->23166 23167 b4570f std::ios_base::_Ios_base_dtor 23164->23167 23168 b3b8a0 41 API calls 23165->23168 23169 b3b8a0 41 API calls 23166->23169 23175 b3b8a0 41 API calls 23167->23175 23170 b46135 23168->23170 23171 b4547c 23169->23171 23172 b3c450 41 API calls 23170->23172 23173 b3b8a0 41 API calls 23171->23173 23176 b46160 std::ios_base::_Ios_base_dtor 23172->23176 23177 b4548b 23173->23177 23179 b38570 155 API calls 23174->23179 23175->22867 23182 b3b8a0 41 API calls 23176->23182 23178 b3c450 41 API calls 23177->23178 23180 b454b6 std::ios_base::_Ios_base_dtor 23178->23180 23181 b45fdc 23179->23181 23187 b3b8a0 41 API calls 23180->23187 23183 b4600c 23181->23183 23184 b3b930 42 API calls 23181->23184 23182->22867 23185 b46036 23183->23185 23186 b4601c 23183->23186 23184->23183 23189 b3b8a0 41 API calls 23185->23189 23188 b3b930 42 API calls 23186->23188 23190 b454d5 23187->23190 23188->23185 23191 b46045 23189->23191 23192 b3b8a0 41 API calls 23190->23192 23193 b3b8a0 41 API calls 23191->23193 23194 b454e4 23192->23194 23193->23110 23195 b3b8a0 41 API calls 23194->23195 23196 b454f3 23195->23196 23197 b3b8a0 41 API calls 23196->23197 23197->23030 23199 d24ed8 ___free_lconv_mon 2 API calls 23198->23199 23200 d0cffe 23199->23200 23200->22661 23202 b3b8cd 23201->23202 23203 b3b8ee std::ios_base::_Ios_base_dtor 23201->23203 23202->23203 23895 d0d31d 41 API calls 2 library calls 23202->23895 23203->22670 23207 b3c4d9 23206->23207 23209 b3c48c std::ios_base::_Ios_base_dtor 23206->23209 23207->22672 23208 b3c450 41 API calls 23208->23209 23209->23207 23209->23208 23210 b3b8a0 41 API calls 23209->23210 23210->23209 23212 d052f0 IsProcessorFeaturePresent 23211->23212 23213 d052ef 23211->23213 23215 d058d2 23212->23215 23213->22674 23896 d05895 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23215->23896 23217 d059b5 23217->22674 23219 bbb83d 23218->23219 23219->22677 23221 b3b94e _Yarn 23220->23221 23222 b3b980 23220->23222 23221->22684 23224 b3ba34 23222->23224 23234 b3c260 42 API calls 3 library calls 23222->23234 23225 b3ba68 std::ios_base::_Ios_base_dtor 23224->23225 23236 d0d31d 41 API calls 2 library calls 23224->23236 23225->22684 23229 b3b9c8 _Yarn 23230 b3ba13 std::ios_base::_Ios_base_dtor 23229->23230 23235 d0d31d 41 API calls 2 library calls 23229->23235 23230->22684 23234->23229 23237->22691 23361 b47430 42 API calls std::_Facet_Register 23238->23361 23240 b47236 23240->22701 23240->23240 23243 b3fa98 _Yarn 23241->23243 23244 b3fad0 23241->23244 23242 b3fb22 _Yarn 23250 b3fb96 std::ios_base::_Ios_base_dtor _Yarn 23242->23250 23363 d0d31d 41 API calls 2 library calls 23242->23363 23243->22713 23244->23242 23362 b3c260 42 API calls 3 library calls 23244->23362 23250->22713 23256 b980ff 23255->23256 23257 b98108 23256->23257 23258 b9812a WideCharToMultiByte 23256->23258 23257->22724 23259 b98178 23258->23259 23260 b98148 GetLastError 23258->23260 23364 b4b160 42 API calls 4 library calls 23259->23364 23261 b98167 23260->23261 23262 d0cfe6 __freea 2 API calls 23261->23262 23264 b9816d 23262->23264 23264->22724 23265 b98197 23266 d0cfe6 __freea 2 API calls 23265->23266 23267 b9819d 23266->23267 23267->22724 23269 b42ffe 23268->23269 23270 b42c9b 23268->23270 23271 b38570 155 API calls 23269->23271 23273 b42cd0 23270->23273 23276 b38570 155 API calls 23270->23276 23272 b43003 23271->23272 23278 d052e7 _ValidateLocalCookies 5 API calls 23272->23278 23274 b42ce6 23273->23274 23275 b42de7 23273->23275 23277 b38570 155 API calls 23274->23277 23279 b38570 155 API calls 23275->23279 23280 b42cb4 GetLastError 23276->23280 23292 b42ceb 23277->23292 23281 b4302e 23278->23281 23282 b42dec MultiByteToWideChar 23279->23282 23280->23273 23281->22748 23284 b42e47 23282->23284 23318 b42f6f 23282->23318 23287 b42e5d MultiByteToWideChar 23284->23287 23285 b42f9d 23288 b42fa5 GlobalFree 23285->23288 23289 b42fa8 23285->23289 23286 b42f9a GlobalFree 23286->23285 23293 b42e8d 23287->23293 23288->23289 23290 b42fb0 GlobalFree 23289->23290 23291 b42fb3 23289->23291 23290->23291 23294 b42fcc GlobalFree 23291->23294 23295 b42fcf 23291->23295 23319 b42da3 23292->23319 23365 d0d4ad 41 API calls _memcpy_s 23292->23365 23302 b38570 155 API calls 23293->23302 23306 b42ea7 23293->23306 23293->23318 23294->23295 23296 b42fd7 GlobalFree 23295->23296 23297 b42fda 23295->23297 23296->23297 23303 b42dd2 23297->23303 23304 b42fe2 23297->23304 23298 b42dbc 23300 b42dc4 GlobalFree 23298->23300 23301 b42dc7 23298->23301 23299 b42db9 GlobalFree 23299->23298 23300->23301 23301->23303 23305 b42dcf GlobalFree 23301->23305 23302->23306 23307 d052e7 _ValidateLocalCookies 5 API calls 23303->23307 23309 d052e7 _ValidateLocalCookies 5 API calls 23304->23309 23305->23303 23310 b42f2a 23306->23310 23313 b38570 155 API calls 23306->23313 23308 b42de3 23307->23308 23308->22748 23311 b42ffa 23309->23311 23310->23318 23366 d0d4ad 41 API calls _memcpy_s 23310->23366 23311->22748 23315 b42f0e GetLastError 23313->23315 23314 b42f6a 23316 b38570 155 API calls 23314->23316 23315->23310 23316->23318 23318->23285 23318->23286 23319->23298 23319->23299 23321 b385a7 23320->23321 23322 b385f8 23320->23322 23367 d05428 6 API calls 23321->23367 23322->22783 23322->22784 23324 b385b1 _memcpy_s 23324->23322 23368 b599e0 23324->23368 23328 b385e7 23462 d053de RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 23328->23462 23330->22726 23331->22743 23332->22761 23333->22793 23334->22781 23335->22854 23336->22869 23337->22812 23338->22923 23339->22933 23340->22825 23341->22938 23342->22947 23343->22846 23344->22969 23345->22990 23346->22921 23347->22871 23348->23043 23349->23059 23350->22942 23351->23138 23352->23152 23353->22924 23354->23099 23355->23112 23356->22989 23357->22987 23358->23093 23359->23116 23360->23136 23361->23240 23362->23242 23364->23265 23365->23319 23366->23314 23367->23324 23369 b59abf 23368->23369 23463 ba3240 23369->23463 23371 b59bcb 23468 ba2a20 23371->23468 23373 b59c0c std::_Facet_Register 23374 b3b930 42 API calls 23373->23374 23375 b5a155 23374->23375 23376 b3b930 42 API calls 23375->23376 23377 b5a166 _memcpy_s std::_Facet_Register 23376->23377 23379 b5a19a _memcpy_s std::_Facet_Register 23377->23379 23534 b84210 55 API calls 2 library calls 23377->23534 23382 b5a1db _memcpy_s std::_Facet_Register 23379->23382 23535 b60140 42 API calls std::_Facet_Register 23379->23535 23381 b5a322 23383 b3b930 42 API calls 23381->23383 23382->23381 23536 b96ea0 RtlInitializeCriticalSection RtlInitializeCriticalSection std::_Facet_Register 23382->23536 23385 b5a351 23383->23385 23386 b3b930 42 API calls 23385->23386 23387 b5a362 GetModuleFileNameW 23386->23387 23388 b5a3e6 PathFindFileNameW 23387->23388 23389 b5a3bb 23387->23389 23391 b5a406 23388->23391 23393 b3b930 42 API calls 23389->23393 23390 b5a26a std::_Facet_Register 23392 b5a2c3 CoCreateGuid StringFromGUID2 23390->23392 23391->23391 23394 b3b930 42 API calls 23391->23394 23397 b5a2ec std::ios_base::_Ios_base_dtor 23392->23397 23393->23388 23395 b5a421 23394->23395 23474 b42660 23395->23474 23397->23381 23397->23397 23400 b3b930 42 API calls 23397->23400 23398 b5a451 GetModuleFileNameW 23481 d0dac9 23398->23481 23400->23381 23401 b5a47d _memcpy_s 23487 b4b3b0 23401->23487 23409 b5a5bc 23514 d0dc40 23409->23514 23413 b5a5d9 _memcpy_s 23523 b5e6e0 23413->23523 23415 b5a865 23417 b3b930 42 API calls 23415->23417 23419 b5a892 23415->23419 23416 b5a61a 23420 b5a72f 23416->23420 23537 b981b0 45 API calls __freea 23416->23537 23417->23419 23421 b5a8f4 GetModuleHandleW 23419->23421 23428 b5a9c1 23419->23428 23420->23415 23538 b981b0 45 API calls __freea 23420->23538 23424 b5a905 GetModuleHandleW 23421->23424 23430 b5a914 23421->23430 23422 b5ac30 23423 b3b930 42 API calls 23422->23423 23426 b5ac4b 23423->23426 23427 b5a9b4 23424->23427 23424->23430 23429 b3b930 42 API calls 23426->23429 23427->23428 23428->23422 23440 b5aa48 23428->23440 23460 b5aaf4 23428->23460 23431 b5ac5c 23429->23431 23539 b97cb0 78 API calls 23430->23539 23432 b3b8a0 41 API calls 23431->23432 23434 b5ac6b 23432->23434 23528 b5e0d0 23434->23528 23435 b5a993 23437 b3b8a0 41 API calls 23435->23437 23439 b5a9a5 23437->23439 23438 b5ac7a 23541 b41ff0 42 API calls 2 library calls 23438->23541 23443 b3b8a0 41 API calls 23439->23443 23540 b97cb0 78 API calls 23440->23540 23442 b5ac89 23444 b3b8a0 41 API calls 23442->23444 23443->23427 23446 b5ac98 23444->23446 23448 d052e7 _ValidateLocalCookies 5 API calls 23446->23448 23447 b5aac7 23449 b3b8a0 41 API calls 23447->23449 23450 b385dd 23448->23450 23451 b5aad9 23449->23451 23461 d0584f 43 API calls 23450->23461 23453 b3b8a0 41 API calls 23451->23453 23452 b5ac01 23454 b3b8a0 41 API calls 23452->23454 23455 b5aae8 23453->23455 23456 b5ac10 23454->23456 23458 b3b930 42 API calls 23455->23458 23457 b3b8a0 41 API calls 23456->23457 23457->23455 23458->23422 23460->23422 23460->23452 23542 b57be0 78 API calls 3 library calls 23460->23542 23461->23328 23462->23322 23464 b3b930 42 API calls 23463->23464 23465 ba32e6 23464->23465 23543 ba37b0 23465->23543 23469 ba2a98 RtlInitializeCriticalSection 23468->23469 23470 ba2a87 23468->23470 23472 b3b8a0 41 API calls 23469->23472 23471 b3b930 42 API calls 23470->23471 23471->23469 23473 ba2aaa 23472->23473 23473->23373 23475 b4267f 23474->23475 23477 b426b3 std::_Facet_Register 23475->23477 23479 b4268b _Yarn std::_Facet_Register 23475->23479 23554 b383b0 RaiseException Concurrency::cancel_current_task 23475->23554 23477->23479 23555 d0d31d 41 API calls 2 library calls 23477->23555 23479->23398 23482 d0dae7 23481->23482 23483 d0dad6 23481->23483 23556 d0da13 23482->23556 23567 d0d30d 41 API calls _memcpy_s 23483->23567 23486 d0dae5 23486->23401 23684 b48740 23487->23684 23489 b4b3e5 23690 b4b4b0 23489->23690 23492 b4b46d 23494 b4b310 23492->23494 23495 b4b32b std::_Facet_Register 23494->23495 23496 b4b342 23495->23496 23730 d07dc6 45 API calls 5 library calls 23495->23730 23498 b4af20 23496->23498 23499 b4afa7 23498->23499 23500 b4afce 23498->23500 23731 d12068 41 API calls _memcpy_s 23499->23731 23502 d052e7 _ValidateLocalCookies 5 API calls 23500->23502 23503 b4b01c 23502->23503 23504 b49780 23503->23504 23508 b497a3 23504->23508 23505 b49b33 23506 d052e7 _ValidateLocalCookies 5 API calls 23505->23506 23507 b49b42 23506->23507 23507->23409 23508->23505 23509 b49a54 23508->23509 23732 b4b160 42 API calls 4 library calls 23509->23732 23511 b49b14 23512 d052e7 _ValidateLocalCookies 5 API calls 23511->23512 23513 b49b2f 23512->23513 23513->23409 23515 d0dc53 _memcpy_s 23514->23515 23733 d0db1b 23515->23733 23517 d0dc5f 23744 d0d049 23517->23744 23520 b49b50 23818 b4a710 23520->23818 23522 b49ba6 std::ios_base::_Ios_base_dtor 23522->23413 23823 b5e8f0 23523->23823 23526 d052e7 _ValidateLocalCookies 5 API calls 23527 b5e714 23526->23527 23527->23416 23529 b5e12f std::ios_base::_Ios_base_dtor 23528->23529 23532 b5e10e 23528->23532 23530 d0cfe6 __freea 2 API calls 23529->23530 23531 b5e160 std::ios_base::_Ios_base_dtor 23530->23531 23531->23438 23532->23529 23533 d0cfe6 __freea 2 API calls 23532->23533 23533->23532 23534->23379 23535->23382 23536->23390 23537->23420 23538->23415 23539->23435 23540->23447 23541->23442 23542->23460 23544 ba37e8 23543->23544 23550 ba32eb 23543->23550 23551 d05428 6 API calls 23544->23551 23546 ba37f2 std::_Facet_Register 23546->23550 23552 d0584f 43 API calls 23546->23552 23548 ba383d 23553 d053de RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 23548->23553 23550->23371 23551->23546 23552->23548 23553->23550 23554->23477 23558 d0da1f __wsopen_s 23556->23558 23557 d0da26 23582 d0d30d 41 API calls _memcpy_s 23557->23582 23558->23557 23559 d0da48 23558->23559 23563 d0da36 23559->23563 23568 d26648 23559->23568 23563->23486 23567->23486 23569 d26654 __wsopen_s 23568->23569 23584 d243b1 RtlEnterCriticalSection 23569->23584 23571 d26662 23585 d266ec 23571->23585 23576 d26831 23577 d267ae 23576->23577 23616 d1f571 23577->23616 23580 d0da89 23583 d0dab2 RtlLeaveCriticalSection 23580->23583 23582->23563 23583->23563 23584->23571 23594 d2670f 23585->23594 23586 d26767 23603 d27c69 23586->23603 23588 d26770 23608 d24ed8 23588->23608 23591 d26779 23593 d2666f 23591->23593 23612 d2838f 6 API calls std::_Locinfo::_Locinfo_dtor 23591->23612 23598 d266a8 23593->23598 23594->23586 23594->23593 23601 d120ae RtlEnterCriticalSection 23594->23601 23602 d120c2 RtlLeaveCriticalSection 23594->23602 23595 d26798 23613 d120ae RtlEnterCriticalSection 23595->23613 23615 d243f9 RtlLeaveCriticalSection 23598->23615 23600 d0da63 23600->23563 23600->23576 23601->23594 23602->23594 23606 d27c76 __dosmaperr 23603->23606 23604 d27ca1 RtlAllocateHeap 23605 d27cb4 23604->23605 23604->23606 23605->23588 23606->23604 23606->23605 23614 d2f006 RtlEnterCriticalSection RtlLeaveCriticalSection __dosmaperr 23606->23614 23609 d24ee3 RtlFreeHeap 23608->23609 23611 d24f05 __dosmaperr 23608->23611 23610 d24ef8 GetLastError 23609->23610 23609->23611 23610->23611 23611->23591 23612->23595 23613->23593 23614->23606 23615->23600 23617 d1f59f std::_Locinfo::_Locinfo_dtor 23616->23617 23622 d1f6ef 23617->23622 23629 d22eee 50 API calls _memcpy_s 23617->23629 23619 d1f6fa 23619->23580 23626 d31cf7 23619->23626 23621 d1f757 23621->23622 23630 d22eee 50 API calls _memcpy_s 23621->23630 23622->23619 23632 d0d30d 41 API calls _memcpy_s 23622->23632 23624 d1f775 23624->23622 23631 d22eee 50 API calls _memcpy_s 23624->23631 23633 d31405 23626->23633 23629->23621 23630->23624 23631->23622 23632->23619 23635 d31411 __wsopen_s 23633->23635 23634 d31418 23682 d0d30d 41 API calls _memcpy_s 23634->23682 23635->23634 23636 d31443 23635->23636 23642 d319cd 23636->23642 23639 d31467 23683 d3149a RtlLeaveCriticalSection __wsopen_s 23639->23683 23641 d31427 23641->23580 23643 d317a9 __wsopen_s 41 API calls 23642->23643 23644 d319ea 23643->23644 23645 d31a18 23644->23645 23646 d319ff 23644->23646 23648 d1fb3d __wsopen_s 14 API calls 23645->23648 23647 d0d47c __dosmaperr 14 API calls 23646->23647 23654 d31a04 23647->23654 23649 d31a1d 23648->23649 23650 d31a26 23649->23650 23651 d31a3d 23649->23651 23653 d0d47c __dosmaperr 14 API calls 23650->23653 23652 d31714 __wsopen_s CreateFileW 23651->23652 23659 d31a76 23652->23659 23653->23654 23654->23639 23655 d31af3 GetFileType 23657 d31b45 23655->23657 23658 d31afe GetLastError 23655->23658 23656 d31ac8 GetLastError 23660 d0d435 __dosmaperr 14 API calls 23656->23660 23664 d1fa88 __wsopen_s 15 API calls 23657->23664 23661 d0d435 __dosmaperr 14 API calls 23658->23661 23659->23655 23659->23656 23662 d31714 __wsopen_s CreateFileW 23659->23662 23660->23654 23663 d31b0c CloseHandle 23661->23663 23665 d31abb 23662->23665 23663->23654 23681 d31b35 23663->23681 23666 d31b66 23664->23666 23665->23655 23665->23656 23667 d31bb2 23666->23667 23669 d31923 __wsopen_s 81 API calls 23666->23669 23668 d314c6 __wsopen_s 81 API calls 23667->23668 23671 d31bb9 23667->23671 23670 d31be7 23668->23670 23669->23667 23670->23671 23672 d31bf5 23670->23672 23673 d26970 __wsopen_s 44 API calls 23671->23673 23672->23654 23674 d31c71 CloseHandle 23672->23674 23673->23654 23675 d31714 __wsopen_s CreateFileW 23674->23675 23676 d31c9c 23675->23676 23677 d31ca6 GetLastError 23676->23677 23676->23681 23678 d0d435 __dosmaperr 14 API calls 23677->23678 23679 d31cb2 23678->23679 23680 d1fc50 __wsopen_s 15 API calls 23679->23680 23680->23681 23681->23654 23682->23641 23683->23641 23708 b48670 42 API calls 2 library calls 23684->23708 23686 b48794 std::_Facet_Register 23687 b487bf 23686->23687 23709 d07dc6 45 API calls 5 library calls 23686->23709 23687->23489 23689 b487b2 23689->23489 23710 d07be3 23690->23710 23693 d07be3 std::_Lockit::_Lockit 7 API calls 23694 b4b524 23693->23694 23697 d07c3b std::_Lockit::~_Lockit 2 API calls 23694->23697 23696 b4b698 23698 d052e7 _ValidateLocalCookies 5 API calls 23696->23698 23701 b4b54c std::_Facet_Register 23697->23701 23699 b4b417 23698->23699 23699->23492 23707 b48670 42 API calls 2 library calls 23699->23707 23700 b4b62c 23702 b4b5a1 std::_Facet_Register 23700->23702 23725 b48000 73 API calls 3 library calls 23700->23725 23701->23700 23701->23702 23723 b47f40 75 API calls 2 library calls 23701->23723 23716 d07c3b 23702->23716 23705 b4b5e3 23724 d0813d 43 API calls __Getctype 23705->23724 23707->23492 23708->23686 23709->23689 23711 d07bf2 23710->23711 23712 d07bf9 23710->23712 23726 d24410 6 API calls 2 library calls 23711->23726 23713 b4b502 23712->23713 23727 d08d66 RtlEnterCriticalSection 23712->23727 23713->23693 23713->23701 23717 d2441e 23716->23717 23720 d07c45 23716->23720 23729 d243f9 RtlLeaveCriticalSection 23717->23729 23719 d07c58 23719->23696 23720->23719 23728 d08d74 RtlLeaveCriticalSection 23720->23728 23721 d24425 23721->23696 23723->23705 23724->23700 23725->23702 23726->23713 23727->23713 23728->23719 23729->23721 23730->23496 23731->23500 23732->23511 23734 d0db27 __wsopen_s 23733->23734 23735 d0db31 23734->23735 23736 d0db54 23734->23736 23765 d0d290 27 API calls 2 library calls 23735->23765 23743 d0db4c 23736->23743 23750 d120ae RtlEnterCriticalSection 23736->23750 23739 d0db72 23751 d0dbb2 23739->23751 23741 d0db7f 23766 d0dbaa RtlLeaveCriticalSection 23741->23766 23743->23517 23745 d0d055 23744->23745 23746 d0d06c 23745->23746 23816 d0d0f4 41 API calls 2 library calls 23745->23816 23749 b5a5c7 23746->23749 23817 d0d0f4 41 API calls 2 library calls 23746->23817 23749->23520 23750->23739 23752 d0dbe2 23751->23752 23753 d0dbbf 23751->23753 23755 d0dbda 23752->23755 23767 d0d8e7 23752->23767 23789 d0d290 27 API calls 2 library calls 23753->23789 23755->23741 23761 d0dc0e 23782 d268cd 23761->23782 23764 d24ed8 ___free_lconv_mon 2 API calls 23764->23755 23765->23743 23766->23743 23768 d0d900 23767->23768 23772 d0d927 23767->23772 23769 d1f8f0 41 API calls 23768->23769 23768->23772 23770 d0d91c 23769->23770 23790 d26340 73 API calls 2 library calls 23770->23790 23773 d26a40 23772->23773 23774 d26a57 23773->23774 23775 d0dc02 23773->23775 23774->23775 23776 d24ed8 ___free_lconv_mon 2 API calls 23774->23776 23777 d1f8f0 23775->23777 23776->23775 23778 d1f911 23777->23778 23779 d1f8fc 23777->23779 23778->23761 23791 d0d30d 41 API calls _memcpy_s 23779->23791 23781 d1f90c 23781->23761 23783 d0dc15 23782->23783 23785 d268f6 23782->23785 23783->23755 23783->23764 23784 d26945 23800 d0d290 27 API calls 2 library calls 23784->23800 23785->23784 23787 d2691d 23785->23787 23792 d2683c 23787->23792 23789->23755 23790->23772 23791->23781 23793 d26848 __wsopen_s 23792->23793 23801 d1fa65 RtlEnterCriticalSection 23793->23801 23795 d26856 23796 d26887 23795->23796 23802 d269a0 23795->23802 23815 d268c1 RtlLeaveCriticalSection __wsopen_s 23796->23815 23799 d268aa 23799->23783 23800->23783 23801->23795 23803 d1fce1 __wsopen_s 41 API calls 23802->23803 23806 d269b0 23803->23806 23804 d269b6 23805 d1fc50 __wsopen_s 15 API calls 23804->23805 23807 d26a0e __wsopen_s 23805->23807 23806->23804 23808 d1fce1 __wsopen_s 41 API calls 23806->23808 23814 d269e8 23806->23814 23807->23796 23810 d269df 23808->23810 23809 d1fce1 __wsopen_s 41 API calls 23811 d269f4 CloseHandle 23809->23811 23812 d1fce1 __wsopen_s 41 API calls 23810->23812 23811->23804 23813 d26a00 GetLastError 23811->23813 23812->23814 23813->23804 23814->23804 23814->23809 23815->23799 23816->23746 23817->23749 23819 b4a74d 23818->23819 23821 b4a778 std::ios_base::_Ios_base_dtor 23819->23821 23822 b4b030 78 API calls 23819->23822 23821->23522 23822->23821 23836 b5ed70 23823->23836 23827 b5e9c6 23830 b5ed70 5 API calls 23827->23830 23831 b5e9ac 23827->23831 23828 d0cfe6 __freea 2 API calls 23829 b5ea3b 23828->23829 23832 d0cfe6 __freea 2 API calls 23829->23832 23830->23831 23831->23828 23833 b5ea62 std::ios_base::_Ios_base_dtor 23832->23833 23834 d052e7 _ValidateLocalCookies 5 API calls 23833->23834 23835 b5e709 23834->23835 23835->23526 23837 b5edb0 23836->23837 23838 d052e7 _ValidateLocalCookies 5 API calls 23837->23838 23839 b5e99f 23838->23839 23839->23831 23840 b5eb70 23839->23840 23841 b5ece0 23840->23841 23842 b5eb8c 23840->23842 23889 b5f4c0 7 API calls _ValidateLocalCookies 23841->23889 23842->23841 23843 b5ecd0 23842->23843 23844 b5ecc0 23842->23844 23845 b5ecae 23842->23845 23854 b5ebf8 23842->23854 23855 b5eb9a 23842->23855 23856 b5ec4b 23842->23856 23888 b5f350 7 API calls _Yarn 23843->23888 23875 b5f170 23844->23875 23861 b5edf0 23845->23861 23850 b5ece9 23850->23827 23852 b5ecc9 23852->23827 23853 b5ecd9 23853->23827 23858 b5ebce 23854->23858 23886 b600b0 RtlFreeHeap GetLastError __freea std::_Facet_Register 23854->23886 23855->23858 23885 b600b0 RtlFreeHeap GetLastError __freea std::_Facet_Register 23855->23885 23856->23858 23887 b600b0 RtlFreeHeap GetLastError __freea std::_Facet_Register 23856->23887 23858->23827 23862 b5ee5f 23861->23862 23863 b5f029 23862->23863 23864 b60020 RtlFreeHeap GetLastError 23862->23864 23874 b5efbd 23862->23874 23890 b5fef0 RtlFreeHeap GetLastError 23862->23890 23863->23874 23891 b60020 RtlFreeHeap GetLastError __freea std::_Facet_Register 23863->23891 23864->23862 23866 b5f077 23892 b5fd50 RtlFreeHeap GetLastError _Yarn 23866->23892 23867 b5f0a0 23872 b5f082 _Yarn 23867->23872 23893 b600b0 RtlFreeHeap GetLastError __freea std::_Facet_Register 23867->23893 23868 d052e7 _ValidateLocalCookies 5 API calls 23870 b5ecb9 23868->23870 23870->23827 23872->23868 23874->23866 23874->23867 23874->23872 23876 b5f18f 23875->23876 23877 b5f197 23875->23877 23894 b600b0 RtlFreeHeap GetLastError __freea std::_Facet_Register 23876->23894 23878 b5ed70 5 API calls 23877->23878 23880 b5f1b9 23878->23880 23881 b5edf0 7 API calls 23880->23881 23882 b5ed70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23880->23882 23883 b5eb70 7 API calls 23880->23883 23884 b5f1ca _Yarn 23880->23884 23881->23880 23882->23880 23883->23880 23884->23852 23885->23858 23886->23858 23887->23858 23888->23853 23889->23850 23890->23862 23891->23874 23892->23872 23893->23872 23894->23877 23896->23217 23906 b43730 23907 b43756 23906->23907 23908 b43abe 23906->23908 23910 b43a1f 23907->23910 23911 b43768 23907->23911 23909 d052e7 _ValidateLocalCookies 5 API calls 23908->23909 23916 b43acb 23909->23916 23914 b43a26 23910->23914 23915 b43a4d 23910->23915 23912 b4376e 23911->23912 23913 b439bf 23911->23913 23917 b437fe 23912->23917 23923 b43779 23912->23923 23919 b439c9 23913->23919 23928 b439f1 23913->23928 23914->23908 23918 b43a31 23914->23918 23920 b38570 155 API calls 23915->23920 23921 b38570 155 API calls 23917->23921 23924 d052e7 _ValidateLocalCookies 5 API calls 23918->23924 23925 d052e7 _ValidateLocalCookies 5 API calls 23919->23925 23920->23928 23932 b43803 23921->23932 23922 b437db 23930 d052e7 _ValidateLocalCookies 5 API calls 23922->23930 23923->23908 23923->23922 23926 b43a47 23924->23926 23927 b439eb 23925->23927 23928->23908 23929 b43ab7 SetEvent 23928->23929 23929->23908 23931 b437f8 23930->23931 23933 b439a3 23932->23933 23934 b43850 23932->23934 23939 b438f3 23932->23939 23936 d052e7 _ValidateLocalCookies 5 API calls 23933->23936 23935 b38570 155 API calls 23934->23935 23937 b43855 23935->23937 23938 b439b9 23936->23938 23946 b43510 44 API calls _ValidateLocalCookies 23937->23946 23939->23928 23939->23933 23941 b4389a std::_Facet_Register 23941->23933 23942 b438d0 SetEvent 23941->23942 23943 b438e0 23942->23943 23944 d052e7 _ValidateLocalCookies 5 API calls 23943->23944 23945 b438ed 23944->23945 23946->23941 24116 b41b40 24118 bcd7ee 24116->24118 24121 bcff12 24118->24121 24126 bd2676 24121->24126 24123 bcff21 24124 bcd7f3 24123->24124 24144 bd261a 11 API calls 2 library calls 24123->24144 24128 bd2682 __EH_prolog3 24126->24128 24127 bd26fb 24173 bbc378 RaiseException Concurrency::cancel_current_task 24127->24173 24128->24127 24129 bd26c3 24128->24129 24131 bd26a9 24128->24131 24170 bd2164 TlsAlloc RtlInitializeCriticalSection LocalAlloc LocalFree RaiseException 24128->24170 24171 bd271b RtlEnterCriticalSection TlsGetValue RtlLeaveCriticalSection RtlLeaveCriticalSection 24129->24171 24131->24127 24145 bd2340 RtlEnterCriticalSection 24131->24145 24137 bd26cf 24139 bd26d5 24137->24139 24140 bd26f1 std::locale::_Setgloballocale 24137->24140 24138 bd26bd 24138->24127 24138->24129 24172 bd27c2 91 API calls 5 library calls 24139->24172 24140->24123 24144->24124 24146 bd2361 24145->24146 24147 bd2470 RtlLeaveCriticalSection 24146->24147 24149 bd240e _memcpy_s 24146->24149 24151 bd23c5 GlobalHandle 24146->24151 24152 bd23b0 24146->24152 24191 bbc392 3 API calls 3 library calls 24147->24191 24150 bd243e RtlLeaveCriticalSection 24149->24150 24150->24138 24154 bd2458 24151->24154 24155 bd23d8 GlobalUnlock 24151->24155 24174 bcd4ae 24152->24174 24154->24147 24157 bd245d GlobalHandle 24154->24157 24159 bcd4ae 77 API calls 24155->24159 24156 bd24f7 RtlEnterCriticalSection 24192 bd276f RaiseException 24156->24192 24157->24147 24161 bd2469 GlobalLock 24157->24161 24158 bd23b8 GlobalAlloc 24162 bd23fa 24158->24162 24163 bd23ee GlobalReAlloc 24159->24163 24161->24147 24162->24154 24166 bd23fe GlobalLock 24162->24166 24163->24162 24164 bd250f RtlLeaveCriticalSection LocalFree 24167 bd252d TlsSetValue 24164->24167 24165 bd247f 24165->24156 24169 bd253e 24165->24169 24166->24147 24166->24149 24167->24169 24169->24138 24170->24131 24171->24137 24172->24140 24175 bcd4c1 24174->24175 24176 bcd4c8 24175->24176 24193 b37ea0 InitializeCriticalSectionAndSpinCount GetLastError LocalAlloc LocalFree RaiseException 24175->24193 24176->24158 24178 bcd4d3 24181 bcd4eb 24178->24181 24194 bbc378 RaiseException Concurrency::cancel_current_task 24178->24194 24181->24158 24191->24165 24192->24164 24193->24178 23897 f6f080 23898 f6f098 23897->23898 23899 f6f1b2 LoadLibraryA 23898->23899 23904 f6f1f7 VirtualProtect VirtualProtect 23898->23904 23900 f6f1c9 23899->23900 23900->23898 23903 f6f1db GetProcAddress 23900->23903 23902 f6f25c 23902->23902 23903->23900 23905 f6f1f1 ExitProcess 23903->23905 23904->23902 23947 d26448 23948 d2646d 23947->23948 23970 d26490 __wsopen_s 23947->23970 23949 d26471 23948->23949 23951 d264cf 23948->23951 23978 d0d290 27 API calls 2 library calls 23949->23978 23952 d264e6 23951->23952 23975 d29316 23951->23975 23979 d25f95 51 API calls 2 library calls 23952->23979 23955 d264f0 23956 d26536 23955->23956 23957 d264f6 23955->23957 23958 d2654a 23956->23958 23959 d26599 WriteFile 23956->23959 23960 d26520 23957->23960 23961 d264fd 23957->23961 23964 d26552 23958->23964 23965 d26587 23958->23965 23962 d265bb GetLastError 23959->23962 23971 d26531 23959->23971 23981 d25b5b 54 API calls 4 library calls 23960->23981 23961->23970 23980 d25f2d 6 API calls __wsopen_s 23961->23980 23962->23971 23968 d26557 23964->23968 23969 d26575 23964->23969 23984 d26013 7 API calls 2 library calls 23965->23984 23968->23970 23972 d26560 23968->23972 23983 d261d7 8 API calls 3 library calls 23969->23983 23971->23970 23982 d260ee 7 API calls 2 library calls 23972->23982 23985 d291f5 23975->23985 23977 d2932f 23977->23952 23978->23970 23979->23955 23980->23970 23981->23971 23982->23970 23983->23971 23984->23971 23991 d1fce1 23985->23991 23987 d29207 23988 d29223 SetFilePointerEx 23987->23988 23989 d2920f __wsopen_s 23987->23989 23988->23989 23990 d2923b GetLastError 23988->23990 23989->23977 23990->23989 23992 d1fd03 23991->23992 23993 d1fcee 23991->23993 23996 d1fd28 23992->23996 24001 d0d47c 14 API calls __dosmaperr 23992->24001 24000 d0d47c 14 API calls __dosmaperr 23993->24000 23996->23987 23997 d1fd33 24002 d0d30d 41 API calls _memcpy_s 23997->24002 23998 d1fcf3 23998->23987 24000->23998 24001->23997 24002->23998 24003 d2220d 24006 d21f59 24003->24006 24007 d21f65 __wsopen_s 24006->24007 24014 d243b1 RtlEnterCriticalSection 24007->24014 24009 d21f73 24015 d21fb4 24009->24015 24011 d21f80 24025 d21fa8 RtlLeaveCriticalSection std::_Lockit::~_Lockit 24011->24025 24013 d21f91 24014->24009 24016 d21fcf 24015->24016 24023 d22042 std::_Locinfo::_Locinfo_dtor 24015->24023 24017 d22022 24016->24017 24016->24023 24026 d13932 24016->24026 24018 d13932 43 API calls 24017->24018 24017->24023 24020 d22038 24018->24020 24022 d24ed8 ___free_lconv_mon 2 API calls 24020->24022 24021 d22018 24024 d24ed8 ___free_lconv_mon 2 API calls 24021->24024 24022->24023 24023->24011 24024->24017 24025->24013 24027 d1393f 24026->24027 24028 d13969 24027->24028 24031 d1394b _memcpy_s 24027->24031 24040 d1ddda 42 API calls _memcpy_s 24027->24040 24032 d2553b 24028->24032 24031->24021 24033 d25553 24032->24033 24037 d25548 std::_Locinfo::_Locinfo_dtor 24032->24037 24034 d2555b 24033->24034 24038 d25564 __dosmaperr 24033->24038 24036 d24ed8 ___free_lconv_mon 2 API calls 24034->24036 24035 d2558e RtlReAllocateHeap 24035->24037 24035->24038 24036->24037 24037->24031 24038->24035 24038->24037 24041 d2f006 RtlEnterCriticalSection RtlLeaveCriticalSection __dosmaperr 24038->24041 24040->24028 24041->24038
                                                        APIs
                                                        • CreateEventW.KERNEL32(00000000,00000000,00000000,?,?,?,CancelPort,0000000A), ref: 00B440A7
                                                        • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B440B7
                                                        • CloseHandle.KERNEL32(?,HTTPSend_03,0000000B,Error_NativeToUTF8,00000012,?,?,?,?,?,?,?), ref: 00B44262
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?), ref: 00B4426B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateEventHandle
                                                        • String ID: &$AAM$CancelPort$Certificate not matching.$Certificate: %s$CertificateNotMatching_01$Error_InvalidArguments$Error_NativeToUTF8$Failed in making http request, in HttpSend$Failed in multibyte to wide conversion, in HttpSend$Failed in quering WinHttpHeaders error:%d$Failed in setting proxycredentials in HttpSend error:%d$Failed in setting status callback in HttpSend$Failed to connect to server, in HttpSend$Failed to connect to server, in HttpSend with secure flag$Failed to delete file: '%s' LastError:%d$Failed to open a WinHttp session, in HttpSend$Failed to open http request, in HttpSend$FileUtils$GET$HTTPConnector::HTTPSend$HTTPConnector::HTTPSend :: After callback : error Type : %d, error code : %d$HTTPConnector::HTTPSend :: WaitForMultipleObjects returned after timeout$HTTPConnector::HTTPSend :: WaitForMultipleObjects returned with cancellation$HTTPConnector::HTTPSend :: WinHttpConnect failed : %d$HTTPConnector::HTTPSend :: WinHttpOpen failed : %d$HTTPConnector::HTTPSend :: WinHttpOpenRequest failed : %d$HTTPConnector::HTTPSend :: WinHttpSendRequest failed : %d$HTTPConnector::HTTPSend :: WinHttpSetCredentials failed : %d$HTTPConnector::HTTPSend :: WinHttpSetStatusCallback failed$HTTPConnectorError$HTTPSend$HTTPSend_01$HTTPSend_03$HttpConnector$WinHttpConnect_01$WinHttpOpenRequest_01$WinHttpOpen_01$WinHttpQueryHeaders_01$WinHttpQueryOption_01$WinHttpSendRequest_01$WinHttpSetCredentials_01$WinHttpSetOption$WinHttpSetStatusCallback_01$`ato$http://$https://$setting secure protocols to TLS1.2 always
                                                        • API String ID: 3369476804-3434179951
                                                        • Opcode ID: a2860f6008778032328df26fa6558eb64d7eba556290828d86f262be8527f5ee
                                                        • Instruction ID: 448484d2b0757162d543597a0db0c9a9f76155958c23a9cc9c43053ed1b7c9f7
                                                        • Opcode Fuzzy Hash: a2860f6008778032328df26fa6558eb64d7eba556290828d86f262be8527f5ee
                                                        • Instruction Fuzzy Hash: 36335670D01259DFDB21DB24CC49B9EBBB8AF15304F6481D9E508A7292DB70AF88DF61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 770 b599e0-b5a181 call b3bf00 call ba3240 call b3bf00 call ba2a20 call bbb836 call b3bf00 * 5 call bbb836 call b3bf00 * 2 call ba2410 call b3b930 * 2 call bbb836 805 b5a183-b5a19a call d09fe0 call b84210 770->805 806 b5a19c 770->806 807 b5a19e-b5a1c2 call bbb836 805->807 806->807 813 b5a1c4-b5a1db call d09fe0 call b60140 807->813 814 b5a1dd 807->814 817 b5a1df-b5a20d call bbb836 813->817 814->817 823 b5a213-b5a2f1 call d09fe0 call b96ea0 call bbb836 * 2 CoCreateGuid StringFromGUID2 call d05864 817->823 824 b5a32e 817->824 849 b5a2f3-b5a2fc 823->849 850 b5a322-b5a32c 823->850 826 b5a330-b5a3b9 call b3b930 * 2 GetModuleFileNameW 824->826 836 b5a3e6-b5a403 PathFindFileNameW 826->836 837 b5a3bb-b5a3c1 826->837 840 b5a406-b5a40f 836->840 839 b5a3c4-b5a3cd 837->839 839->839 842 b5a3cf-b5a3e1 call b3b930 839->842 840->840 843 b5a411-b5a622 call b3b930 call b42660 GetModuleFileNameW call d0dac9 call d09fe0 call b4b3b0 call b4b310 call b4af20 call b49780 call d0dc40 call b49b50 call d09fe0 call b5e190 call b5e6e0 840->843 842->836 878 b5a624-b5a633 call b59910 843->878 879 b5a639-b5a694 call b5e5e0 843->879 852 b5a300-b5a309 849->852 850->826 852->852 854 b5a30b-b5a31d call b3b930 852->854 854->850 878->879 884 b5a732-b5a768 call b3bf00 878->884 879->884 885 b5a69a-b5a6ff call b5e5e0 879->885 890 b5a76e-b5a7ce call b5e5e0 884->890 891 b5a868-b5a870 884->891 892 b5a706-b5a70d 885->892 893 b5a701-b5a704 885->893 890->891 905 b5a7d4-b5a834 call b5e5e0 890->905 894 b5a892-b5a8c3 call b3be70 891->894 895 b5a872-b5a88d call b3b930 891->895 897 b5a712-b5a71f 892->897 893->897 907 b5a9c1-b5a9ec call b3be70 894->907 908 b5a8c9-b5a8ee call b3be70 894->908 895->894 898 b5a724-b5a72f call b981b0 897->898 899 b5a721 897->899 898->884 899->898 915 b5a836-b5a839 905->915 916 b5a83b-b5a842 905->916 918 b5ac30-b5ac75 call b3b930 * 2 call b3b8a0 call b5e0d0 907->918 919 b5a9f2-b5aa17 call b3be70 907->919 908->907 917 b5a8f4-b5a903 GetModuleHandleW 908->917 920 b5a847-b5a854 915->920 916->920 924 b5a905-b5a90e GetModuleHandleW 917->924 925 b5a914-b5a9b4 call b3bf00 * 2 call b97cb0 call b3b8a0 * 2 917->925 953 b5ac7a-b5acbe call b41ff0 call b3b8a0 call d052e7 918->953 919->918 933 b5aa1d-b5aa42 call b3be70 919->933 921 b5a856 920->921 922 b5a859-b5a865 call b981b0 920->922 921->922 922->891 924->925 931 b5a9bb 924->931 925->931 931->907 943 b5aaf4-b5ab19 call b3be70 933->943 944 b5aa48-b5aaef call b3bf00 * 2 call b97cb0 call b3b8a0 * 2 933->944 943->918 954 b5ab1f-b5ab87 call b3bf00 * 2 943->954 984 b5ac26-b5ac2b call b3b930 944->984 973 b5ab89-b5abc9 954->973 975 b5ac01-b5ac21 call b3b8a0 * 2 973->975 976 b5abcb-b5abcf 973->976 975->984 976->975 979 b5abd1-b5abd3 976->979 982 b5acf4-b5acf7 979->982 983 b5abd9-b5abe0 979->983 982->975 988 b5acfd-b5ad2a call b57be0 982->988 987 b5abe6-b5abea 983->987 984->918 987->975 990 b5abec-b5abef 987->990 988->973 992 b5abf0-b5abf3 990->992 994 b5acbf-b5acc1 992->994 995 b5abf9-b5abff 992->995 994->975 996 b5acc7-b5accb 994->996 995->975 995->992 997 b5ace6-b5acf2 996->997 998 b5accd-b5accf 996->998 997->982 999 b5acd5-b5acdc 998->999 1000 b5ad2f-b5ad44 999->1000 1001 b5acde-b5ace4 999->1001 1000->987 1001->997 1001->999
                                                        APIs
                                                          • Part of subcall function 00BA2A20: RtlInitializeCriticalSection.NTDLL(00DE08A4), ref: 00BA2A9C
                                                        • CoCreateGuid.COMBASE(00000000), ref: 00B5A2C9
                                                        • StringFromGUID2.COMBASE(00000000,?,00000104), ref: 00B5A2DC
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00D94E3C,00000000,00D94C6C,00000002,?,?,00000000,00000000,0000000D), ref: 00B5A3B5
                                                        • PathFindFileNameW.SHLWAPI(?,?,?,00000000,00000000,0000000D), ref: 00B5A3FB
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00D98058,00000000,00000000,-00000002,?,?,00000000,00000000,0000000D), ref: 00B5A463
                                                        • GetModuleHandleW.KERNEL32(tmmon.dll,?,?,?,?,00000000,00000038,?,?,?,?,?,00D99834,?,?,00000000), ref: 00B5A8FF
                                                        • GetModuleHandleW.KERNEL32(tmmon64.dll,?,?,?,?,00000000,00000038,?,?,?,?,?,00D99834,?,?,00000000), ref: 00B5A90A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Module$FileName$Handle$CreateCriticalFindFromGuidInitializePathSectionString
                                                        • String ID: 3$5.1$ADM$ADM$ApplicationContext$_acr$_cra$_crd$en_US$en_US$false$install$live$packageListCS$readerdc$readerdc64$tmmon.dll$tmmon64.dll$true
                                                        • API String ID: 2029594171-4111704561
                                                        • Opcode ID: 3d36ca98547ab5bb0d1e05bae0b8d69175c09030bcacc3596361ecf38b19086f
                                                        • Instruction ID: 6893dc1d346fcb6861425792d99f413fe4353792c0cf76f35f0dc7a65656413b
                                                        • Opcode Fuzzy Hash: 3d36ca98547ab5bb0d1e05bae0b8d69175c09030bcacc3596361ecf38b19086f
                                                        • Instruction Fuzzy Hash: 53B28C70D053D8CAEB10EF64DD94B997BB0EB65308F1482D9D448AB392D7B52AC8CF61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4058 f6f080-f6f090 4059 f6f0a2-f6f0a7 4058->4059 4060 f6f0a9 4059->4060 4061 f6f0ab 4060->4061 4062 f6f098-f6f09d 4060->4062 4064 f6f0b0-f6f0b2 4061->4064 4063 f6f09e-f6f0a0 4062->4063 4063->4059 4063->4060 4065 f6f0b4-f6f0b9 4064->4065 4066 f6f0bb-f6f0bf 4064->4066 4065->4066 4067 f6f0c1 4066->4067 4068 f6f0cc-f6f0cf 4066->4068 4069 f6f0c3-f6f0ca 4067->4069 4070 f6f0eb-f6f0f0 4067->4070 4071 f6f0d1-f6f0d6 4068->4071 4072 f6f0d8-f6f0da 4068->4072 4069->4068 4069->4070 4073 f6f0f2-f6f0fb 4070->4073 4074 f6f103-f6f105 4070->4074 4071->4072 4072->4064 4075 f6f172-f6f175 4073->4075 4076 f6f0fd-f6f101 4073->4076 4077 f6f107-f6f10c 4074->4077 4078 f6f10e 4074->4078 4081 f6f17a-f6f17d 4075->4081 4076->4078 4077->4078 4079 f6f110-f6f113 4078->4079 4080 f6f0dc-f6f0de 4078->4080 4083 f6f115-f6f11a 4079->4083 4084 f6f11c 4079->4084 4085 f6f0e7-f6f0e9 4080->4085 4086 f6f0e0-f6f0e5 4080->4086 4082 f6f17f-f6f181 4081->4082 4082->4081 4087 f6f183-f6f186 4082->4087 4083->4084 4084->4080 4088 f6f11e-f6f120 4084->4088 4089 f6f13d-f6f14c 4085->4089 4086->4085 4087->4081 4090 f6f188-f6f1a4 4087->4090 4091 f6f122-f6f127 4088->4091 4092 f6f129-f6f12d 4088->4092 4093 f6f14e-f6f155 4089->4093 4094 f6f15c-f6f169 4089->4094 4090->4082 4095 f6f1a6 4090->4095 4091->4092 4092->4088 4096 f6f12f 4092->4096 4093->4093 4097 f6f157 4093->4097 4094->4094 4098 f6f16b-f6f16d 4094->4098 4099 f6f1ac-f6f1b0 4095->4099 4100 f6f131-f6f138 4096->4100 4101 f6f13a 4096->4101 4097->4063 4098->4063 4102 f6f1f7-f6f1fa 4099->4102 4103 f6f1b2-f6f1c8 LoadLibraryA 4099->4103 4100->4088 4100->4101 4101->4089 4105 f6f1fd-f6f204 4102->4105 4104 f6f1c9-f6f1ce 4103->4104 4104->4099 4106 f6f1d0-f6f1d2 4104->4106 4107 f6f206-f6f208 4105->4107 4108 f6f228-f6f258 VirtualProtect * 2 4105->4108 4110 f6f1d4-f6f1da 4106->4110 4111 f6f1db-f6f1e8 GetProcAddress 4106->4111 4112 f6f20a-f6f219 4107->4112 4113 f6f21b-f6f226 4107->4113 4109 f6f25c-f6f260 4108->4109 4109->4109 4114 f6f262 4109->4114 4110->4111 4115 f6f1f1 ExitProcess 4111->4115 4116 f6f1ea-f6f1ef 4111->4116 4112->4105 4113->4112 4116->4104
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?), ref: 00F6F1C2
                                                        • GetProcAddress.KERNEL32(?,00F57FF9), ref: 00F6F1E0
                                                        • ExitProcess.KERNEL32(?,00F57FF9), ref: 00F6F1F1
                                                        • VirtualProtect.KERNEL32(00B30000,00001000,00000004,?,00000000), ref: 00F6F23F
                                                        • VirtualProtect.KERNEL32(00B30000,00001000), ref: 00F6F254
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                                        • String ID:
                                                        • API String ID: 1996367037-0
                                                        • Opcode ID: e5db3ce5cb6f0904c5b26aff4a31ed20d7db6bf37ba937b433649e7730662efd
                                                        • Instruction ID: bce6671636fca9899c1e5b4baad5395d6b191ef1bc8945ae63f7e2f2a5d61026
                                                        • Opcode Fuzzy Hash: e5db3ce5cb6f0904c5b26aff4a31ed20d7db6bf37ba937b433649e7730662efd
                                                        • Instruction Fuzzy Hash: EA5138B2E507529BD7208EB8FCC0660B7A0EB533747680739C5E6C73C6E7A4590EA764

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1002 b42c70-b42c95 1003 b42ffe-b43031 call b38570 call d052e7 1002->1003 1004 b42c9b-b42cad 1002->1004 1008 b42caf-b42cd7 call b38570 GetLastError 1004->1008 1009 b42cdb-b42ce0 1004->1009 1008->1009 1010 b42ce6-b42d1d call b38570 call d095a7 1009->1010 1011 b42de7-b42e41 call b38570 MultiByteToWideChar 1009->1011 1031 b42d24-b42d37 call d095a7 1010->1031 1032 b42d1f-b42d22 1010->1032 1025 b42e47-b42e95 call bd19ad MultiByteToWideChar 1011->1025 1026 b42f8c-b42f98 1011->1026 1025->1026 1045 b42e9b-b42ea0 1025->1045 1029 b42f9d-b42fa3 1026->1029 1030 b42f9a-b42f9b GlobalFree 1026->1030 1034 b42fa5-b42fa6 GlobalFree 1029->1034 1035 b42fa8-b42fae 1029->1035 1030->1029 1049 b42d39 1031->1049 1050 b42dab-b42db7 1031->1050 1038 b42d3d-b42d4f call d095a7 1032->1038 1034->1035 1036 b42fb0-b42fb1 GlobalFree 1035->1036 1037 b42fb3-b42fb9 1035->1037 1036->1037 1040 b42fc4-b42fca 1037->1040 1041 b42fbb-b42fc1 call bc2a1c 1037->1041 1052 b42d56 1038->1052 1053 b42d51-b42d54 1038->1053 1047 b42fcc-b42fcd GlobalFree 1040->1047 1048 b42fcf-b42fd5 1040->1048 1041->1040 1054 b42ed4-b42ed9 1045->1054 1055 b42ea2-b42ed2 call b38570 1045->1055 1047->1048 1057 b42fd7-b42fd8 GlobalFree 1048->1057 1058 b42fda-b42fdc 1048->1058 1049->1038 1059 b42dbc-b42dc2 1050->1059 1060 b42db9-b42dba GlobalFree 1050->1060 1063 b42d58-b42d60 1052->1063 1053->1063 1065 b42f31-b42f37 1054->1065 1066 b42edb-b42ee3 1054->1066 1075 b42eeb-b42f07 1055->1075 1057->1058 1067 b42dd2-b42de6 call d052e7 1058->1067 1068 b42fe2-b42ffd call d052e7 1058->1068 1061 b42dc4-b42dc5 GlobalFree 1059->1061 1062 b42dc7-b42dcd 1059->1062 1060->1059 1061->1062 1062->1067 1070 b42dcf-b42dd0 GlobalFree 1062->1070 1071 b42d70-b42d73 1063->1071 1072 b42d62-b42d6c 1063->1072 1065->1026 1069 b42f39-b42f3c 1065->1069 1066->1075 1076 b42f40-b42f49 1069->1076 1070->1067 1071->1050 1079 b42d75-b42d79 1071->1079 1072->1072 1077 b42d6e 1072->1077 1075->1065 1088 b42f09-b42f26 call b38570 GetLastError 1075->1088 1076->1076 1081 b42f4b-b42f55 1076->1081 1077->1071 1079->1050 1083 b42d7b-b42d7d 1079->1083 1081->1026 1086 b42f57-b42f87 call d0d4ad call b38570 1081->1086 1087 b42d80-b42d89 1083->1087 1086->1026 1087->1087 1091 b42d8b-b42d95 1087->1091 1100 b42f2a-b42f2e 1088->1100 1091->1050 1094 b42d97-b42da6 call d0d4ad 1091->1094 1094->1050 1100->1065
                                                        APIs
                                                        • GetLastError.KERNEL32 ref: 00B42CC0
                                                        • GlobalFree.KERNEL32(?), ref: 00B42DBA
                                                        • GlobalFree.KERNEL32(?), ref: 00B42DC5
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00B42E35
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00B42E77
                                                        • GetLastError.KERNEL32 ref: 00B42F1A
                                                        • GlobalFree.KERNEL32(?), ref: 00B42F9B
                                                        • GlobalFree.KERNEL32(?), ref: 00B42FA6
                                                        • GlobalFree.KERNEL32(?), ref: 00B42FB1
                                                        • GlobalFree.KERNEL32(?), ref: 00B42FCD
                                                        • GlobalFree.KERNEL32(?), ref: 00B42FD8
                                                        • GlobalFree.KERNEL32(?), ref: 00B42DD0
                                                          • Part of subcall function 00B38570: __Init_thread_footer.LIBCMT ref: 00B385F3
                                                        Strings
                                                        • `ato, xrefs: 00B42FE3
                                                        • GetIEProxyInfo - proxy fetched is :%s, xrefs: 00B42CFA
                                                        • ://, xrefs: 00B42D3D
                                                        • https=, xrefs: 00B42D03
                                                        • GetIEProxyInfo - No default proxy present on the user machine, xrefs: 00B42DF7
                                                        • GetIEProxyInfo - invalid arguments, xrefs: 00B4300E
                                                        • GetIEProxyInfo - Failed to get proxy setting for current user :%d, xrefs: 00B42CC7
                                                        • HTTPConnectorError, xrefs: 00B43013
                                                        • GetIEProxyInfo - Failed to get proxy for the url, error:%d, xrefs: 00B42F21
                                                        • WinHTTP AutoProxy, xrefs: 00B42E82
                                                        • GetIEProxyInfo - autoconfig url on the machine is :%s, xrefs: 00B42EB6
                                                        • GetIEProxyInfo - proxy Url is %s, xrefs: 00B42F7B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: FreeGlobal$ByteCharErrorLastMultiWide$Init_thread_footer
                                                        • String ID: ://$GetIEProxyInfo - Failed to get proxy for the url, error:%d$GetIEProxyInfo - Failed to get proxy setting for current user :%d$GetIEProxyInfo - No default proxy present on the user machine$GetIEProxyInfo - autoconfig url on the machine is :%s$GetIEProxyInfo - invalid arguments$GetIEProxyInfo - proxy Url is %s$GetIEProxyInfo - proxy fetched is :%s$HTTPConnectorError$WinHTTP AutoProxy$`ato$https=
                                                        • API String ID: 1541574466-452352629
                                                        • Opcode ID: a91dab4cbe7e8fa33f9f2f41e220ddcf3eb99b463b0f8056c3a3c45f94c2ef94
                                                        • Instruction ID: 260126ac0311a5a2f0cb19095203bd62b7043ffd0dd98661de082ca46b97106f
                                                        • Opcode Fuzzy Hash: a91dab4cbe7e8fa33f9f2f41e220ddcf3eb99b463b0f8056c3a3c45f94c2ef94
                                                        • Instruction Fuzzy Hash: 15A1D531A043029FDB249F24CC09B6BBBE8EF85714F4805ADFC45A7291DB75D905EBA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1102 bd2340-bd235f RtlEnterCriticalSection 1103 bd2375-bd2378 1102->1103 1104 bd2361-bd2365 1102->1104 1107 bd237a-bd237d 1103->1107 1108 bd23a2-bd23a4 1103->1108 1105 bd236b-bd236f 1104->1105 1106 bd2470-bd249b RtlLeaveCriticalSection call bbc392 1104->1106 1105->1103 1112 bd2433-bd2439 1105->1112 1124 bd249d 1106->1124 1125 bd24f7-bd2538 RtlEnterCriticalSection call bd276f RtlLeaveCriticalSection LocalFree TlsSetValue 1106->1125 1107->1106 1109 bd2383-bd2388 1107->1109 1110 bd23a5-bd23ae 1108->1110 1113 bd238b-bd238e 1109->1113 1116 bd23c5-bd23d2 GlobalHandle 1110->1116 1117 bd23b0-bd23c3 call bcd4ae GlobalAlloc 1110->1117 1114 bd243e-bd2457 RtlLeaveCriticalSection 1112->1114 1115 bd243b 1112->1115 1119 bd2398-bd239a 1113->1119 1120 bd2390-bd2396 1113->1120 1115->1114 1122 bd2458-bd245b 1116->1122 1123 bd23d8-bd23f4 GlobalUnlock call bcd4ae GlobalReAlloc 1116->1123 1133 bd23fa-bd23fc 1117->1133 1119->1112 1126 bd23a0 1119->1126 1120->1113 1120->1119 1122->1106 1127 bd245d-bd2467 GlobalHandle 1122->1127 1123->1133 1131 bd24a0-bd24a2 1124->1131 1152 bd253e-bd2542 1125->1152 1126->1110 1127->1106 1132 bd2469-bd246a GlobalLock 1127->1132 1136 bd24bd-bd24c8 1131->1136 1137 bd24a4-bd24ab 1131->1137 1132->1106 1133->1122 1140 bd23fe-bd240c GlobalLock 1133->1140 1138 bd24ca-bd24e0 1136->1138 1139 bd24e3-bd24e6 1136->1139 1137->1136 1141 bd24ad-bd24b4 1137->1141 1138->1139 1143 bd24ea 1139->1143 1140->1106 1142 bd240e-bd2431 call d09fe0 1140->1142 1141->1143 1144 bd24b6-bd24bb 1141->1144 1142->1112 1147 bd24ed-bd24f1 1143->1147 1144->1147 1147->1131 1151 bd24f3-bd24f5 1147->1151 1151->1125 1151->1152
                                                        APIs
                                                        • RtlEnterCriticalSection.NTDLL(00DDDCA0), ref: 00BD234E
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,00DDDC84,00DDDC84,?,00BD26BD,00000004,00BCFF21,00BBC3C6,00BCD7F3,00B41B52,00000002,?), ref: 00BD23BD
                                                        • GlobalHandle.KERNEL32(00DDDC94), ref: 00BD23C7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00BD23D9
                                                        • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00BD23F4
                                                        • GlobalLock.KERNEL32(00000000), ref: 00BD23FF
                                                        • RtlLeaveCriticalSection.NTDLL(00DDDCA0), ref: 00BD244B
                                                        • GlobalHandle.KERNEL32(00DDDC94), ref: 00BD245F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00BD246A
                                                        • RtlLeaveCriticalSection.NTDLL(00DDDCA0), ref: 00BD2474
                                                        • RtlEnterCriticalSection.NTDLL(00000000), ref: 00BD24FD
                                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 00BD2510
                                                        • LocalFree.KERNEL32(?), ref: 00BD2519
                                                        • TlsSetValue.KERNEL32(00000000,00000000), ref: 00BD2538
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Global$CriticalSection$Leave$AllocEnterHandleLock$FreeLocalUnlockValue
                                                        • String ID:
                                                        • API String ID: 3723562325-0
                                                        • Opcode ID: 0941098dd9d04bc2e673dd888ea54e38213d8509ec21092cc4b401e2c79ac357
                                                        • Instruction ID: 4e43c21f05dbf86d0fcfdff6530aa2223287d766e2a8d25ba0be8d0b914f6074
                                                        • Opcode Fuzzy Hash: 0941098dd9d04bc2e673dd888ea54e38213d8509ec21092cc4b401e2c79ac357
                                                        • Instruction Fuzzy Hash: 2C616C31A00345EFDB149F68D888A99BBE4EF54315F5480AAEE01DB361EB71E951CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1154 b43730-b43750 1155 b43756-b43762 1154->1155 1156 b43abf-b43ace call d052e7 1154->1156 1158 b43a1f-b43a24 1155->1158 1159 b43768 1155->1159 1162 b43a26-b43a2b 1158->1162 1163 b43a4d-b43a6b call b38570 1158->1163 1160 b4376e-b43773 1159->1160 1161 b439bf-b439c7 1159->1161 1165 b437fe-b4383b call b38570 1160->1165 1166 b43779-b4377e 1160->1166 1169 b439f1-b439f5 1161->1169 1170 b439c9-b439ee call d052e7 1161->1170 1167 b43a31-b43a33 1162->1167 1168 b43abe 1162->1168 1197 b43a86-b43aa0 call b42b30 1163->1197 1198 b43a6d-b43a83 1163->1198 1208 b43841-b4384a 1165->1208 1209 b439a3-b439a5 1165->1209 1166->1168 1173 b43784-b4378b 1166->1173 1180 b43a3a-b43a4a call d052e7 1167->1180 1168->1156 1175 b439f7-b439fa 1169->1175 1176 b439fe-b43a07 1169->1176 1178 b4378d-b43798 1173->1178 1179 b437db-b437e4 1173->1179 1175->1176 1182 b43aa3-b43ab5 1176->1182 1183 b43a0d-b43a14 1176->1183 1184 b437c8-b437ca 1178->1184 1185 b4379a-b437af 1178->1185 1196 b437eb-b437fb call d052e7 1179->1196 1182->1168 1201 b43ab7-b43ab8 SetEvent 1182->1201 1189 b43a17-b43a1a 1183->1189 1184->1179 1194 b437cc-b437d5 1184->1194 1185->1184 1191 b437b1-b437c1 call d0d4a2 1185->1191 1189->1182 1191->1184 1210 b437c3-b437c5 1191->1210 1194->1168 1194->1179 1197->1182 1198->1197 1201->1168 1211 b43850-b4389c call b38570 call b43510 1208->1211 1212 b438f3-b43907 1208->1212 1213 b439ac-b439bc call d052e7 1209->1213 1210->1184 1237 b4389e-b438aa call bbb836 1211->1237 1238 b438b8-b438ca 1211->1238 1215 b43909 1212->1215 1216 b4396a-b43975 1212->1216 1221 b43937-b4394a 1215->1221 1222 b4390b-b4390e 1215->1222 1219 b43977-b4397e 1216->1219 1220 b43910-b43919 1216->1220 1219->1220 1219->1221 1228 b43985-b4398c 1219->1228 1223 b4392d 1220->1223 1224 b4391b-b4392b 1220->1224 1226 b4394c-b43955 1221->1226 1227 b43999-b4399d 1221->1227 1222->1220 1222->1221 1229 b43934 1223->1229 1224->1223 1224->1229 1230 b43957-b43968 1226->1230 1231 b4398e-b43993 1226->1231 1227->1182 1227->1209 1228->1229 1229->1221 1230->1227 1235 b43996 1231->1235 1235->1227 1242 b438b3 1237->1242 1243 b438ac-b438b1 1237->1243 1238->1209 1244 b438d0-b438f0 SetEvent call d052e7 1238->1244 1245 b438b5 1242->1245 1243->1245 1245->1238
                                                        APIs
                                                        • SetEvent.KERNEL32(00000000), ref: 00B438D1
                                                        • SetEvent.KERNEL32(?), ref: 00B43AB8
                                                          • Part of subcall function 00B38570: __Init_thread_footer.LIBCMT ref: 00B385F3
                                                        Strings
                                                        • WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE..., xrefs: 00B4380E
                                                        • WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE : error : %d, xrefs: 00B43957
                                                        • HTTPConnectorError, xrefs: 00B43865
                                                        • HttpConnector, xrefs: 00B43A7A
                                                        • WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE : Successful header(s): %d, xrefs: 00B4398E
                                                        • WINHTTP_CALLBACK_STATUS_READ_COMPLETE : complete, xrefs: 00B43A0F
                                                        • HTTP Request Status code:407. The proxy requires authentication., xrefs: 00B43860
                                                        • WINHTTP_CALLBACK_STATUS_REQUEST_ERROR : error : %d, xrefs: 00B43A75
                                                        • WINHTTP_CALLBACK_STATUS_REQUEST_ERROR..., xrefs: 00B43A5D
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Event$Init_thread_footer
                                                        • String ID: HTTP Request Status code:407. The proxy requires authentication.$HTTPConnectorError$HttpConnector$WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE : Successful header(s): %d$WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE : error : %d$WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE...$WINHTTP_CALLBACK_STATUS_READ_COMPLETE : complete$WINHTTP_CALLBACK_STATUS_REQUEST_ERROR : error : %d$WINHTTP_CALLBACK_STATUS_REQUEST_ERROR...
                                                        • API String ID: 1146775995-3466066548
                                                        • Opcode ID: b7fa8089b8bebd5db99c6c088394ca751bb83113b2633705a672d921b70da8a8
                                                        • Instruction ID: e7f817dbd5b506e3ad1fe54f970599d518771915d229b4e923946c1948c7f8f8
                                                        • Opcode Fuzzy Hash: b7fa8089b8bebd5db99c6c088394ca751bb83113b2633705a672d921b70da8a8
                                                        • Instruction Fuzzy Hash: DFB1E070A003059FDB24DF64DC85B6EB3F4EF44B14F1805AEE947AB291DB71AA44EB60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1249 d319cd-d319fd call d317a9 1252 d31a18-d31a24 call d1fb3d 1249->1252 1253 d319ff-d31a0a call d0d47c 1249->1253 1259 d31a26-d31a3b call d0d47c call d0d48f 1252->1259 1260 d31a3d-d31a86 call d31714 1252->1260 1258 d31a0c-d31a13 call d0d48f 1253->1258 1269 d31cf2-d31cf6 1258->1269 1259->1258 1267 d31af3-d31afc GetFileType 1260->1267 1268 d31a88-d31a91 1260->1268 1274 d31b45-d31b48 1267->1274 1275 d31afe-d31b2f GetLastError call d0d435 CloseHandle 1267->1275 1272 d31a93-d31a97 1268->1272 1273 d31ac8-d31aee GetLastError call d0d435 1268->1273 1272->1273 1278 d31a99-d31ac6 call d31714 1272->1278 1273->1258 1276 d31b51-d31b57 1274->1276 1277 d31b4a-d31b4f 1274->1277 1275->1258 1286 d31b35-d31b40 call d0d48f 1275->1286 1281 d31b5b-d31ba9 call d1fa88 1276->1281 1282 d31b59 1276->1282 1277->1281 1278->1267 1278->1273 1292 d31bab-d31bb7 call d31923 1281->1292 1293 d31bc8-d31bf0 call d314c6 1281->1293 1282->1281 1286->1258 1292->1293 1300 d31bb9 1292->1300 1298 d31bf2-d31bf3 1293->1298 1299 d31bf5-d31c36 1293->1299 1301 d31bbb-d31bc3 call d26970 1298->1301 1302 d31c57-d31c65 1299->1302 1303 d31c38-d31c3c 1299->1303 1300->1301 1301->1269 1305 d31cf0 1302->1305 1306 d31c6b-d31c6f 1302->1306 1303->1302 1304 d31c3e-d31c52 1303->1304 1304->1302 1305->1269 1306->1305 1309 d31c71-d31ca4 CloseHandle call d31714 1306->1309 1312 d31ca6-d31cd2 GetLastError call d0d435 call d1fc50 1309->1312 1313 d31cd8-d31cec 1309->1313 1312->1313 1313->1305
                                                        APIs
                                                          • Part of subcall function 00D31714: CreateFileW.KERNEL32(00000000,00000000,?,00D31A76,?,?,00000000,?,00D31A76,00000000,0000000C), ref: 00D31731
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31AE1
                                                        • __dosmaperr.LIBCMT ref: 00D31AE8
                                                        • GetFileType.KERNEL32(00000000), ref: 00D31AF4
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D31AFE
                                                        • __dosmaperr.LIBCMT ref: 00D31B07
                                                        • CloseHandle.KERNEL32(00000000), ref: 00D31B27
                                                        • CloseHandle.KERNEL32(00000000), ref: 00D31C74
                                                        • GetLastError.KERNEL32 ref: 00D31CA6
                                                        • __dosmaperr.LIBCMT ref: 00D31CAD
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID:
                                                        • API String ID: 4237864984-0
                                                        • Opcode ID: 3cd5bfc50db5363fdfedf1c98f6b0bb040452eba73da1b6785387dfdb7bc3c3d
                                                        • Instruction ID: 5b6a5d010a24c2a844a4a982125112b84b6d522c8d91a8a5e92a29d973d475b4
                                                        • Opcode Fuzzy Hash: 3cd5bfc50db5363fdfedf1c98f6b0bb040452eba73da1b6785387dfdb7bc3c3d
                                                        • Instruction Fuzzy Hash: F3A12236A042569FCF19AF68DC91BAD7BA1EB06320F180159E815DF391DB34D842CB71
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @y#$Pw#$Px#$Py#$`x#$x#
                                                        • API String ID: 0-644835717
                                                        • Opcode ID: 80a34aaf7873a7ecf5cda67f28829f60f9fc3db50f86a149088fb0475e62cc52
                                                        • Instruction ID: ec45d4e733485f68b74a655b7089a35d9cf891cde46e654c8d0a4050ca56c3cb
                                                        • Opcode Fuzzy Hash: 80a34aaf7873a7ecf5cda67f28829f60f9fc3db50f86a149088fb0475e62cc52
                                                        • Instruction Fuzzy Hash: 78230570A083109FDB24CF64CC82BAEB7A5EF68754F14444AF956AB381D7B6DC81CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2155 d28d30-d28d40 2156 d28d42-d28d55 call d0d47c call d0d48f 2155->2156 2157 d28d5a-d28d5c 2155->2157 2171 d290c8 2156->2171 2158 d28d62-d28d68 2157->2158 2159 d290b0-d290bd call d0d47c call d0d48f 2157->2159 2158->2159 2163 d28d6e-d28d9a 2158->2163 2177 d290c3 call d0d30d 2159->2177 2163->2159 2166 d28da0-d28da9 2163->2166 2169 d28dc3-d28dc5 2166->2169 2170 d28dab-d28dbe call d0d47c call d0d48f 2166->2170 2174 d28dcb-d28dcf 2169->2174 2175 d290ac-d290ae 2169->2175 2170->2177 2176 d290cb-d290ce 2171->2176 2174->2175 2179 d28dd5-d28dd9 2174->2179 2175->2176 2177->2171 2179->2170 2182 d28ddb-d28df2 2179->2182 2183 d28e37-d28e3d 2182->2183 2184 d28df4-d28df7 2182->2184 2188 d28e0e-d28e25 call d0d47c call d0d48f call d0d30d 2183->2188 2189 d28e3f-d28e46 2183->2189 2186 d28e06-d28e0c 2184->2186 2187 d28df9-d28e01 2184->2187 2186->2188 2191 d28e2a-d28e35 2186->2191 2190 d28eb7-d28eca 2187->2190 2220 d28fe3 2188->2220 2193 d28e4a-d28e68 call d255a4 call d24ed8 * 2 2189->2193 2194 d28e48 2189->2194 2197 d28ed0-d28edc 2190->2197 2198 d28f86-d28f8f call d31206 2190->2198 2196 d28eb4 2191->2196 2226 d28e85-d28e8e call d292d6 2193->2226 2227 d28e6a-d28e80 call d0d48f call d0d47c 2193->2227 2194->2193 2196->2190 2197->2198 2200 d28ee2-d28ee4 2197->2200 2211 d29000 2198->2211 2212 d28f91-d28fa3 2198->2212 2200->2198 2204 d28eea-d28f0b 2200->2204 2204->2198 2208 d28f0d-d28f23 2204->2208 2208->2198 2213 d28f25-d28f27 2208->2213 2216 d29004-d2901a ReadFile 2211->2216 2212->2211 2217 d28fa5-d28fb4 GetConsoleMode 2212->2217 2213->2198 2218 d28f29-d28f4c 2213->2218 2221 d29078-d29083 GetLastError 2216->2221 2222 d2901c-d29022 2216->2222 2217->2211 2223 d28fb6-d28fba 2217->2223 2218->2198 2225 d28f4e-d28f64 2218->2225 2224 d28fe6-d28ff0 call d24ed8 2220->2224 2228 d29085-d29097 call d0d48f call d0d47c 2221->2228 2229 d2909c-d2909f 2221->2229 2222->2221 2230 d29024 2222->2230 2223->2216 2231 d28fbc-d28fd4 ReadConsoleW 2223->2231 2224->2176 2225->2198 2235 d28f66-d28f68 2225->2235 2246 d28e93-d28ead 2226->2246 2227->2220 2228->2220 2232 d290a5-d290a7 2229->2232 2233 d28fdc-d28fe2 call d0d435 2229->2233 2239 d29027-d29039 2230->2239 2240 d28fd6 GetLastError 2231->2240 2241 d28ff5-d28ffe 2231->2241 2232->2224 2233->2220 2235->2198 2244 d28f6a-d28f81 2235->2244 2239->2224 2248 d2903b-d2903f 2239->2248 2240->2233 2241->2239 2244->2198 2246->2196 2252 d29041-d29051 call d28a4a 2248->2252 2253 d29058-d29065 2248->2253 2262 d29054-d29056 2252->2262 2254 d29071-d29076 call d288a2 2253->2254 2255 d29067 call d28ba1 2253->2255 2263 d2906c-d2906f 2254->2263 2255->2263 2262->2224 2263->2262
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9b7a18ee4142467658f8b8714d03f3c11b413e617bceb3685022c6831572ed1a
                                                        • Instruction ID: 1950bd2cc1be270acb9fb4707ec08fb500ef554f0c2c3ed869c4e4e3b31f62c5
                                                        • Opcode Fuzzy Hash: 9b7a18ee4142467658f8b8714d03f3c11b413e617bceb3685022c6831572ed1a
                                                        • Instruction Fuzzy Hash: 01B1F570A04369AFDB01DF98E990BADBBB2EF65318F184159E504AB392CB71D941CB70
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @y#$Pw#$Px#$Py#$`x#$x#
                                                        • API String ID: 0-644835717
                                                        • Opcode ID: 243518fe595f6eda0b372ca2746696323c13ba09c58db3f1a2daadc8e7993e07
                                                        • Instruction ID: bcdd2031d405b1c8a0c516753369de6e4b38f27ee8cdbc96878187fe012cb13b
                                                        • Opcode Fuzzy Hash: 243518fe595f6eda0b372ca2746696323c13ba09c58db3f1a2daadc8e7993e07
                                                        • Instruction Fuzzy Hash: 99A2AD71A043148FDB24CF58C881BAEB7B1BFA9314F15819AE949AB351D771EC81CFA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @y#$Pw#$Px#$Py#$`x#$x#
                                                        • API String ID: 0-644835717
                                                        • Opcode ID: 2d80d9d508caaf611a659bfabf5e6e01dbfce1684e61f8001edd4c75e81831bd
                                                        • Instruction ID: b1e76127058fab8118394bd449edbd1c5578bc6ba2be95049970b6a718f672c5
                                                        • Opcode Fuzzy Hash: 2d80d9d508caaf611a659bfabf5e6e01dbfce1684e61f8001edd4c75e81831bd
                                                        • Instruction Fuzzy Hash: 0D42A071A083148FDB24CF58C881BAAB7F1EF99314F15819AE949AB352D771EC42CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4117 d291f5-d2920d call d1fce1 4120 d29223-d29239 SetFilePointerEx 4117->4120 4121 d2920f-d29216 4117->4121 4123 d2923b-d2924c GetLastError call d0d458 4120->4123 4124 d2924e-d29258 4120->4124 4122 d2921d-d29221 4121->4122 4125 d29274-d29277 4122->4125 4123->4122 4124->4122 4127 d2925a-d2926f 4124->4127 4127->4125
                                                        APIs
                                                        • SetFilePointerEx.KERNEL32(00000000,00000000,?,00008000,00D267ED,00008000,00D267ED,?,?,?,00D292FF,00D267ED,?,00000000,00D267ED,?), ref: 00D29231
                                                        • GetLastError.KERNEL32(00000000,?,?,?,00D292FF,00D267ED,?,00000000,00D267ED,?,00000000,00008000,00D267ED,?,?,00D319EA), ref: 00D2923E
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 8f5ea1538c0c887f8d8b6c144e762856031b11cffff9a060984c98e0314fee4d
                                                        • Instruction ID: 4f7fb0d9dacc46fa988c417d80736840b697a20d3c1ec142b5f6f9394e46268d
                                                        • Opcode Fuzzy Hash: 8f5ea1538c0c887f8d8b6c144e762856031b11cffff9a060984c98e0314fee4d
                                                        • Instruction Fuzzy Hash: 76012B32A14218FFCB058F94EC0599E7B2AEF91324F680204F8119B291EA71ED51CBB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4129 d24ed8-d24ee1 4130 d24ee3-d24ef6 RtlFreeHeap 4129->4130 4131 d24f10-d24f11 4129->4131 4130->4131 4132 d24ef8-d24f0f GetLastError call d0d3f2 call d0d48f 4130->4132 4132->4131
                                                        APIs
                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00D2D385,?,00000000,?,?,00D2D626,?,00000007,?,?,00D2DB81,?,?), ref: 00D24EEE
                                                        • GetLastError.KERNEL32(?,?,00D2D385,?,00000000,?,?,00D2D626,?,00000007,?,?,00D2DB81,?,?), ref: 00D24EF9
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 485612231-0
                                                        • Opcode ID: 228d90fcf436747bdb8ed2e095add5812aa33b6d264715fd3f01d4bedd76b5bf
                                                        • Instruction ID: e7a25d345a0027fca3a0792d9a60a0b580c847392221cb3128717d62ed5128b4
                                                        • Opcode Fuzzy Hash: 228d90fcf436747bdb8ed2e095add5812aa33b6d264715fd3f01d4bedd76b5bf
                                                        • Instruction Fuzzy Hash: CFE0E631104364ABCB112BE5BC097993B69EF90755F544411FA0CD7561DA75E850CBB4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4137 d269a0-d269b4 call d1fce1 4140 d269b6-d269b8 4137->4140 4141 d269ba-d269c2 4137->4141 4142 d26a08-d26a28 call d1fc50 4140->4142 4143 d269c4-d269cb 4141->4143 4144 d269cd-d269d0 4141->4144 4152 d26a3a 4142->4152 4153 d26a2a-d26a38 call d0d458 4142->4153 4143->4144 4146 d269d8-d269ec call d1fce1 * 2 4143->4146 4147 d269d2-d269d6 4144->4147 4148 d269ee-d269fe call d1fce1 CloseHandle 4144->4148 4146->4140 4146->4148 4147->4146 4147->4148 4148->4140 4159 d26a00-d26a06 GetLastError 4148->4159 4157 d26a3c-d26a3f 4152->4157 4153->4157 4159->4142
                                                        APIs
                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,00D2698F,00D31BC0,?,00000000,00000000), ref: 00D269F6
                                                        • GetLastError.KERNEL32(?,00000000,?,00D2698F,00D31BC0,?,00000000,00000000), ref: 00D26A00
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast
                                                        • String ID:
                                                        • API String ID: 918212764-0
                                                        • Opcode ID: 7ff471e3b169cef3a1da0d5814f589cb9bdb53801fccab6a01fcf41033db8ede
                                                        • Instruction ID: a4ea7366dff588e274aee8093fc99ef3b53ad2118f3c53c41f29f1d87b9a5743
                                                        • Opcode Fuzzy Hash: 7ff471e3b169cef3a1da0d5814f589cb9bdb53801fccab6a01fcf41033db8ede
                                                        • Instruction Fuzzy Hash: 4E114C336043342BC620673479857AD2B8A9BA273CF280219FD18DB2D2DE71DCC1D6B0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4162 d26831-d26837 call d1f571 4166 d267d6-d267e8 call d31cf7 4162->4166 4167 d2682d-d26830 4162->4167 4169 d267ed-d267f2 4166->4169 4169->4167 4170 d267f4-d2682c 4169->4170
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 25e599c42cc8e809c57d9cb658c7f53879adc4e200c333fa3a8a6a81ac670089
                                                        • Instruction ID: 13eb06d2406a1c0f7e411fd8a7f9445c546940e66893dba9ded3547d7cb95be2
                                                        • Opcode Fuzzy Hash: 25e599c42cc8e809c57d9cb658c7f53879adc4e200c333fa3a8a6a81ac670089
                                                        • Instruction Fuzzy Hash: 56113672A0420AAFCB05DF58E941D9B7BF9EF48314F1440AAF809AB351D671EE11CBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4171 bd2676-bd2688 call d05d8e 4174 bd26fb-bd2705 call bbc378 4171->4174 4175 bd268a-bd268e 4171->4175 4185 bd2718-bd271a 4174->4185 4186 bd2707-bd270f 4174->4186 4176 bd2690-bd2697 4175->4176 4177 bd26c3-bd26d3 call bd271b 4175->4177 4179 bd2699-bd26b4 call bd2164 4176->4179 4180 bd26b6-bd26b8 call bd2340 4176->4180 4191 bd26d5-bd26ec call bd27c2 4177->4191 4192 bd26f1-bd26f8 call d05d5c 4177->4192 4179->4174 4179->4180 4189 bd26bd-bd26c1 4180->4189 4186->4185 4190 bd2711-bd2717 call bd271b 4186->4190 4189->4174 4189->4177 4191->4192
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00BD267D
                                                          • Part of subcall function 00BD2164: TlsAlloc.KERNEL32(?,00BD26A9,00000004,00BCFF21,00BBC3C6,00BCD7F3,00B41B52,00000002,?,?,?,?,?,00000002,?,?), ref: 00BD2183
                                                          • Part of subcall function 00BD2164: RtlInitializeCriticalSection.NTDLL(00DDDCA0), ref: 00BD2194
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AllocCriticalH_prolog3InitializeSection
                                                        • String ID:
                                                        • API String ID: 2369468792-0
                                                        • Opcode ID: 769f8a8a5c4077d2701dcd48511139e5212a08d763d1d1ac06de601321e0c453
                                                        • Instruction ID: 45a002ce5080f9ee70bd193d49887af08a5824d374d544b66a1bd40467378979
                                                        • Opcode Fuzzy Hash: 769f8a8a5c4077d2701dcd48511139e5212a08d763d1d1ac06de601321e0c453
                                                        • Instruction Fuzzy Hash: 8B1139346027828BDF25AF78C855A6AB7E5EF64350B1400AAA905DB3A0FF74DC50DBB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4200 d2553b-d25546 4201 d25553-d25559 4200->4201 4202 d25548-d25551 call d255a4 4200->4202 4204 d25564-d25567 4201->4204 4205 d2555b-d25562 call d24ed8 4201->4205 4212 d25577-d25579 4202->4212 4206 d25569-d2556e call d0d48f 4204->4206 4207 d2558e-d255a0 RtlReAllocateHeap 4204->4207 4216 d25574 4205->4216 4206->4216 4213 d255a2 4207->4213 4214 d2557a-d25581 call d21e86 4207->4214 4215 d25576 4213->4215 4214->4206 4220 d25583-d2558c call d2f006 4214->4220 4215->4212 4216->4215 4220->4206 4220->4207
                                                        APIs
                                                        • RtlReAllocateHeap.NTDLL(00000000,00000000,00BA383D,00D2223E), ref: 00D25598
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 2234d18b5224f5a2fca5220dd22a1925db799956f141b61b3b32fefd86514dc4
                                                        • Instruction ID: 8f47f94e7381428e439a127d6965fb7070bf6e2f9089b57a29a5e67d79d55960
                                                        • Opcode Fuzzy Hash: 2234d18b5224f5a2fca5220dd22a1925db799956f141b61b3b32fefd86514dc4
                                                        • Instruction Fuzzy Hash: 49F09632504A75A6DB212E65FC00F6B376BDFB1B7CF1D4125FC549A198DB30D90085B0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4223 d27c69-d27c74 4224 d27c82-d27c88 4223->4224 4225 d27c76-d27c80 4223->4225 4227 d27ca1-d27cb2 RtlAllocateHeap 4224->4227 4228 d27c8a-d27c8b 4224->4228 4225->4224 4226 d27cb6-d27cc1 call d0d48f 4225->4226 4234 d27cc3-d27cc5 4226->4234 4230 d27cb4 4227->4230 4231 d27c8d-d27c94 call d21e86 4227->4231 4228->4227 4230->4234 4231->4226 4236 d27c96-d27c9f call d2f006 4231->4236 4236->4226 4236->4227
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,00B3BA7E,00000000), ref: 00D27CAA
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: a4596ee47dbfd22af7ce6773ee1401279f8d2d9ddb27178eaf626aecbb0cc890
                                                        • Instruction ID: b142f685b3dcd5db2289f085eb9e111ef737dc2407a956fd3d7b7a27ff6d13d9
                                                        • Opcode Fuzzy Hash: a4596ee47dbfd22af7ce6773ee1401279f8d2d9ddb27178eaf626aecbb0cc890
                                                        • Instruction Fuzzy Hash: 20F0B431508630679B316F76BC05B5A375AEF607A8B198121BC04EA291CA20DC00A6F1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 4239 d31714-d31738 CreateFileW
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,00000000,?,00D31A76,?,?,00000000,?,00D31A76,00000000,0000000C), ref: 00D31731
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 6a82c109321ca21cf946c11b1fc04544119a8eefbde3de8b19115111661af034
                                                        • Instruction ID: a7867c8f221d94d38493582a82744edf938b4cc87dd3b89f10fd4577f532dc9e
                                                        • Opcode Fuzzy Hash: 6a82c109321ca21cf946c11b1fc04544119a8eefbde3de8b19115111661af034
                                                        • Instruction Fuzzy Hash: C2D06C3200020DFBDF028F84DD06EDA3BAAFB48715F014100BE1896120C732E822AB90
                                                        APIs
                                                          • Part of subcall function 00B985C0: CoCreateGuid.COMBASE(00000000), ref: 00B985E5
                                                          • Part of subcall function 00B985C0: StringFromGUID2.COMBASE(00000000,?,00000104), ref: 00B985F8
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B46F2A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateFromGuidHandleString
                                                        • String ID:
                                                        • API String ID: 849493299-0
                                                        • Opcode ID: 88803ab86313bbb0bbcf1d46754c5e77c07747c3828aed061318968e4deb53f9
                                                        • Instruction ID: 9c41bc0db1734015ec82237dd117e24976c17cdd0492d1a6beb74fc941aa0645
                                                        • Opcode Fuzzy Hash: 88803ab86313bbb0bbcf1d46754c5e77c07747c3828aed061318968e4deb53f9
                                                        • Instruction Fuzzy Hash: BD5178B0900709EFDB10DFA4C855B9EBBF5FF05304F10825DE519AB291E775A648CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c11e29946336cee951b577333642840d5421237d58b7aec868e903d98d38bb67
                                                        • Instruction ID: 269715366b8086533cc834a3022a948f3cffed402eb4590da51084e635a4ce8c
                                                        • Opcode Fuzzy Hash: c11e29946336cee951b577333642840d5421237d58b7aec868e903d98d38bb67
                                                        • Instruction Fuzzy Hash: 4C4213F0A043A39FEB60EF54C881BFEB7A1BB45714F14415AED427B281D775AC818BA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0c61bdfdc06fd60cab63b1a7bf51b1ec0c918f231309377e14c7e8665fb0791a
                                                        • Instruction ID: dbaacf67adb8fbe664fe673eb6a2ed5cd659094f7cfab36723d1fbb311da70fd
                                                        • Opcode Fuzzy Hash: 0c61bdfdc06fd60cab63b1a7bf51b1ec0c918f231309377e14c7e8665fb0791a
                                                        • Instruction Fuzzy Hash: CA428B71A082159FDB14CF94C8A1AFEB7B1BF4C354F14845AE956AF381C771A882CBB1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2596648553a9b1cf466968bf920834d6d9643a37fd392aa70693f6f088bb42e
                                                        • Instruction ID: 1bb082879220a1b6dd803e70b47740079e3d7a75f342dda258c4bb39d892db36
                                                        • Opcode Fuzzy Hash: b2596648553a9b1cf466968bf920834d6d9643a37fd392aa70693f6f088bb42e
                                                        • Instruction Fuzzy Hash: E231A0F1E0424A9FCF14CF58C8C1AEEBBA5FB58314F20466EDD15A7385C735A9428BA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: defd298594bfb4a21df6a0d02bd579671f184f44d441b39138153176e86fd888
                                                        • Instruction ID: 9d3510993d420ec7f215fe042422a6b166fc8a69e166fd6fac7add34fdf5cb55
                                                        • Opcode Fuzzy Hash: defd298594bfb4a21df6a0d02bd579671f184f44d441b39138153176e86fd888
                                                        • Instruction Fuzzy Hash: B031C0B0A0421A8FCB14CF08C490BE9FFF5FF49314F104249D958AB351D771A851CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 76df6767d01c63359bb40def81e2ed6dd3debf5e6c8071960e31521be257d5ee
                                                        • Instruction ID: 6d463f25a898ded1f0e1312a9e44aacd12c2fb153dff6ca52b8e424d77c50b5e
                                                        • Opcode Fuzzy Hash: 76df6767d01c63359bb40def81e2ed6dd3debf5e6c8071960e31521be257d5ee
                                                        • Instruction Fuzzy Hash: 8391A075A042148FDB24CF18C881BAAFBF1BFA5314F15858AE98997392D771EC81CF51
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97efe8956e3bf4ec913870b747cb07b8268e1d5141a94a443109f04984a1d820
                                                        • Instruction ID: bc61e325e35c5fa1306e40381fe94977de6f9812f41245e96e893243e41af4a2
                                                        • Opcode Fuzzy Hash: 97efe8956e3bf4ec913870b747cb07b8268e1d5141a94a443109f04984a1d820
                                                        • Instruction Fuzzy Hash: BC818B75A042188FDB24CF18C881BAAF7F1FFA5314F15858AE949A7351D771EC818F90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e2583c3b5290e93044d3b048df18a09978d3564a531a8bdca5e13ec86c5ee52
                                                        • Instruction ID: e035989ff35646810db00fa2e770f006b8c96a1f92d546968a8ea5f67873abf8
                                                        • Opcode Fuzzy Hash: 1e2583c3b5290e93044d3b048df18a09978d3564a531a8bdca5e13ec86c5ee52
                                                        • Instruction Fuzzy Hash: 15818A75A042288FDB24CF18C881BAAFBB1FFA5314F15858AE949A7351D771EC818F90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a882e042448d23381000f6acd6786c4098fd64cc809502a51a9e25bbccd5df72
                                                        • Instruction ID: be5b828f94bbf7ebfdedb0544a3e845fe29cbe702d1d8c3425f48f12d458964b
                                                        • Opcode Fuzzy Hash: a882e042448d23381000f6acd6786c4098fd64cc809502a51a9e25bbccd5df72
                                                        • Instruction Fuzzy Hash: B9818A75A042288FDB24CF18C881BAAFBB1FFA5314F15858AE949A7351D771EC818F90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4184237496.00000000094A0000.00000010.00000800.00020000.00000000.sdmp, Offset: 094A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_94a0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c79f9237adef790e3e348840f65e62ec9f43b749af93ea54cfa569b7112fa3f6
                                                        • Instruction ID: 05d35d5d7298dccab981ec7d4f238dfb290b99b9e7522a7082fc9fb2c388cf6b
                                                        • Opcode Fuzzy Hash: c79f9237adef790e3e348840f65e62ec9f43b749af93ea54cfa569b7112fa3f6
                                                        • Instruction Fuzzy Hash: 5D819A75A002188FDB24CF18C881BAAFBF5FFA5314F15858AE959A7351D771EC818F90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178128333.0000000007570000.00000010.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7570000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be9087f37778a2f0e00e02fe602c10948d445b2f37a7f8af824cc9eaf0eb3ad9
                                                        • Instruction ID: 55e115d022873f38ada3c0788fc43820fe800d77ebaf1d5fc6f06c44b9230933
                                                        • Opcode Fuzzy Hash: be9087f37778a2f0e00e02fe602c10948d445b2f37a7f8af824cc9eaf0eb3ad9
                                                        • Instruction Fuzzy Hash: 065128B0605351AFEB30CB68ECC5BE9BBE5BF45308F40545AEA459B282C7B598D0C762
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178179412.0000000007588000.00000010.00000800.00020000.00000000.sdmp, Offset: 07588000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7588000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 649fdf076a9a05f18817ee256ad97f1b6acd3b9a53dde0da4ba1b3386893716d
                                                        • Instruction ID: c776ba197982dd34fd75a5189803a264ecd03f36f2a3f645f3382775fe17c5b2
                                                        • Opcode Fuzzy Hash: 649fdf076a9a05f18817ee256ad97f1b6acd3b9a53dde0da4ba1b3386893716d
                                                        • Instruction Fuzzy Hash: 3541F9F07503419FDB64AA2ECC81BFA7795FF45356F0414FAEA02A7292CB65D840CA72
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50a378427a63d53d17ac1717f3caae47638427df574b7563f629619e27c14733
                                                        • Instruction ID: 4543d4e57f86a8263bb1bdda1dd49d7f99a0bd89a53728ddccd4f280a925505f
                                                        • Opcode Fuzzy Hash: 50a378427a63d53d17ac1717f3caae47638427df574b7563f629619e27c14733
                                                        • Instruction Fuzzy Hash: AB5103B0910705CFDB60EF24C881BEABBB4FF06324F10455AE5567B280E7719891CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a92b151bda8de5bad770c2cb1cdf9ededf225818d57f65ff6135a920b77c82d
                                                        • Instruction ID: 713e0457b93b5c562b5cb3e5afeb20447885cb70bd0b8b1322fca7e960956952
                                                        • Opcode Fuzzy Hash: 7a92b151bda8de5bad770c2cb1cdf9ededf225818d57f65ff6135a920b77c82d
                                                        • Instruction Fuzzy Hash: C741D0B1A042159FDB44DF04C881AEAFBE5FF88320F158659ED59BB341D730AD50CB91
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e46cdedc51c8aebec2c499059d03266105cdedeceacd1a0b5fe34ef790c67f2
                                                        • Instruction ID: 5a3a6f066273b232982fba72470cf3778f4b6f06d77428bca59b645b9a2de9c9
                                                        • Opcode Fuzzy Hash: 0e46cdedc51c8aebec2c499059d03266105cdedeceacd1a0b5fe34ef790c67f2
                                                        • Instruction Fuzzy Hash: 6C4103F064431A9FDB10EF55C891BD9BFA0FF05318F104249E9647B391D7B59851CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178128333.0000000007570000.00000010.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7570000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb9b55a97035ad6bcaca227b14fd1da25b0d55b9a3d183eb96bb9ff579eb23dd
                                                        • Instruction ID: 575766bc09e3fdb30f469253f2b7854e19ef9851885b85830d622a883e27351e
                                                        • Opcode Fuzzy Hash: bb9b55a97035ad6bcaca227b14fd1da25b0d55b9a3d183eb96bb9ff579eb23dd
                                                        • Instruction Fuzzy Hash: E231DFB0208A05AFD710CF54E895FE4B7E4FF85315F00895AE9698B252C766E852CF82
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eac3cf6cc0f7ba0a37a11a574997fef5e58117c384ced377420f5b0c66faebd8
                                                        • Instruction ID: e270ce9e6b992fb168ca2381c2a813672a6564f247cdcd8c07d494f72301a59a
                                                        • Opcode Fuzzy Hash: eac3cf6cc0f7ba0a37a11a574997fef5e58117c384ced377420f5b0c66faebd8
                                                        • Instruction Fuzzy Hash: AD2105F0A81309AFCB509F55C881BEDBBA8FF05325F11055AE914B7250E771A8A0CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a5b7abdd2f27be169af9fa2078febcf2d1edc5f075dac55f452b313f4aef613d
                                                        • Instruction ID: e0fa56438e88e800e4e81a91b2946b83fc76c7a0770cea98d388a301ed3b068a
                                                        • Opcode Fuzzy Hash: a5b7abdd2f27be169af9fa2078febcf2d1edc5f075dac55f452b313f4aef613d
                                                        • Instruction Fuzzy Hash: 1F21CFF4615302AFDB54EF64CD81BE973E4FF08300F090859EA66A7341E775AA608B52
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178128333.0000000007570000.00000010.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7570000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 457c74c03af57ddb8bb4ffb747e669c148456a8c49c27bd5e6526f9dff0418be
                                                        • Instruction ID: 49e79fb91e9f6b185104e681d0260c095437fbac3c84891a418744852588730d
                                                        • Opcode Fuzzy Hash: 457c74c03af57ddb8bb4ffb747e669c148456a8c49c27bd5e6526f9dff0418be
                                                        • Instruction Fuzzy Hash: CC117FF1604602AFDB118B59DC41FE6B7E8FF45620F050559FE6597390C770A851CB92
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178179412.0000000007588000.00000010.00000800.00020000.00000000.sdmp, Offset: 07588000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7588000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c850dc9ea37eeb6862c18a3d9ccc3ac32f16f6253fa2d8c5a2bb6444d98efde9
                                                        • Instruction ID: 329e9285c604ee1f3d532e80a1c8406dbc751777c93894ac8ad841ba0b6d7d54
                                                        • Opcode Fuzzy Hash: c850dc9ea37eeb6862c18a3d9ccc3ac32f16f6253fa2d8c5a2bb6444d98efde9
                                                        • Instruction Fuzzy Hash: 6D11D0B1A0430A9FD714EE84D881EFEB765FF85324F10495FE856A3240D73694928BB2
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 678436ddbd8a6178c57f25b01b4fd7121a1e7eb6849344afacac82f1969dffe5
                                                        • Instruction ID: 9eda1bf7c5120bdbd22721e495f427d3c2084edfa24f87e9bb62daae1c364bd8
                                                        • Opcode Fuzzy Hash: 678436ddbd8a6178c57f25b01b4fd7121a1e7eb6849344afacac82f1969dffe5
                                                        • Instruction Fuzzy Hash: 7B1159F13543065BFF15AA688C83AE87B84FF02315F000258EE16F7291DB5084508FA3
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 913b1049c1e21815ac4318ec5e2d1e5bfd9f3c85f7ba482aad62345d5d3ad043
                                                        • Instruction ID: 32d38baeef3c695667ae93723df51a834b299a45b5278f724bc4c058d208900a
                                                        • Opcode Fuzzy Hash: 913b1049c1e21815ac4318ec5e2d1e5bfd9f3c85f7ba482aad62345d5d3ad043
                                                        • Instruction Fuzzy Hash: 0B01BCB4204202DFDB51DF00C985BD8B7F0BF08300F054885EEA8AB351E370E9608B51
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178128333.0000000007570000.00000010.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7570000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a957b861ae27b0335069c878d781d4fd09fa8e4295bb6eff5febc2c7e43e678e
                                                        • Instruction ID: 605069234511b25fda6f4f94df5c1798e018546b63360a164d5a066d04bb3d02
                                                        • Opcode Fuzzy Hash: a957b861ae27b0335069c878d781d4fd09fa8e4295bb6eff5febc2c7e43e678e
                                                        • Instruction Fuzzy Hash: 08F0A0707453009FC721DF68EC84AE6F7E4EF5A224F4044AAF9058B2A1D765AC15C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: db59ac67821130910f598bad10fcee95a2b9d1ca029c691c4f86db083eee0064
                                                        • Instruction ID: 5006abdbd4afc2107b0a8e59540e88c74a0c15950b53a827759e816a9ae7d64c
                                                        • Opcode Fuzzy Hash: db59ac67821130910f598bad10fcee95a2b9d1ca029c691c4f86db083eee0064
                                                        • Instruction Fuzzy Hash: 1CE01AB5904300EFDB50DF54C841ACCF7B1FF44720F554489A991B7651D775A6909B42
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178179412.0000000007588000.00000010.00000800.00020000.00000000.sdmp, Offset: 07588000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7588000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b6dbea24120f4455d6630bef83c9494dda02ae4ab5fe4c8c2a02be772db9305f
                                                        • Instruction ID: 0107fc82a744aa824c73316ea0f933589dbf41f427069d5365089832d6fa90de
                                                        • Opcode Fuzzy Hash: b6dbea24120f4455d6630bef83c9494dda02ae4ab5fe4c8c2a02be772db9305f
                                                        • Instruction Fuzzy Hash: CEC012377091184B8210CA8CEC40886F3D8EBC8235B1546ABEA6CC3210D622E9204BC1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3532e9bdfe9ef099b1936e328aa43655ded7bb1c9341291ff2a9e6df166d0ba8
                                                        • Instruction ID: b1590a68f721173106c3388df8dfbef386e990dbc92692afeda48d5af673b162
                                                        • Opcode Fuzzy Hash: 3532e9bdfe9ef099b1936e328aa43655ded7bb1c9341291ff2a9e6df166d0ba8
                                                        • Instruction Fuzzy Hash: D9C012B1916380AFCB82CF6498858C87BF0BA40220B808595E8648B622E6288A25CB02
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4178155286.0000000007581000.00000010.00000800.00020000.00000000.sdmp, Offset: 07581000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7581000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 19428025f0653ecc33206f3e38f56e9203df3e159b0e4ff622f88e20b853b1fa
                                                        • Instruction ID: a42d597332dd9ba43e7184a328fb6c576bbfbf249660cc83bfa584320e119e00
                                                        • Opcode Fuzzy Hash: 19428025f0653ecc33206f3e38f56e9203df3e159b0e4ff622f88e20b853b1fa
                                                        • Instruction Fuzzy Hash: 46C02BB4C101014FC780CF18C4811C9F7E0FB40220FA081409C29C3233D624E54747C1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4177953352.00000000074F0000.00000010.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_74f0000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction ID: a3e7ff57c30c3c519a6f4ef2049b59df0173dbf1574db4df29bb93500e9b721c
                                                        • Opcode Fuzzy Hash: 2a53f5df87aa036113af4922cf7daa5a5d1063a47a94a9813af2550d5e07c575
                                                        • Instruction Fuzzy Hash:
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(51CEB70F,2000000B,00000000,00000002,00000000,?,?,?,00D2EEB0,?,00000000), ref: 00D2EC2B
                                                        • GetLocaleInfoW.KERNEL32(51CEB70F,20001004,00000000,00000002,00000000,?,?,?,00D2EEB0,?,00000000), ref: 00D2EC54
                                                        • GetACP.KERNEL32(?,?,00D2EEB0,?,00000000), ref: 00D2EC69
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID: ACP$OCP
                                                        • API String ID: 2299586839-711371036
                                                        • Opcode ID: 67b5ac98156fb240d7f6395721ca878d291c196a429c03296ed5b2e5a425bfa9
                                                        • Instruction ID: a74fbd4d9d5caa278edd852aba1683e5d7997cc37b26917cd5c2cbd8148a9fe7
                                                        • Opcode Fuzzy Hash: 67b5ac98156fb240d7f6395721ca878d291c196a429c03296ed5b2e5a425bfa9
                                                        • Instruction Fuzzy Hash: 2D21C532A00125AADB349F95E940A9773A6ABB0F5CF5E4164F94ADB214E732DD40E370
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00D2EE73
                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00D2EEBC
                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00D2EECB
                                                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00D2EF13
                                                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00D2EF32
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                        • String ID:
                                                        • API String ID: 415426439-0
                                                        • Opcode ID: 72ab6e1275e4bc39b998856739f01eea3ece494385683d21e964984d2119e48e
                                                        • Instruction ID: 27815a1baebed99617339c060859bc89d6d2026424d7069fa50d22eac59e2847
                                                        • Opcode Fuzzy Hash: 72ab6e1275e4bc39b998856739f01eea3ece494385683d21e964984d2119e48e
                                                        • Instruction Fuzzy Hash: B3517C72A00225ABEB10EFA4EC45EBA77B8FF68709F090569F915E7190E770D9048B71
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetACP.KERNEL32(?,?,?,?,?,?,00D20F1A,?,?,?,?,?,-00000050,?,?,?), ref: 00D2E4C4
                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00D20F1A,?,?,?,?,?,-00000050,?,?), ref: 00D2E4EF
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00D2E652
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$CodeInfoLocalePageValid
                                                        • String ID: utf8
                                                        • API String ID: 607553120-905460609
                                                        • Opcode ID: 4d84f2d8a28af6146276657e4ff016c645616e7175b957796272a327aa31a3a2
                                                        • Instruction ID: 0d7c2b3a006dd2d3f7e0d6cd5bb0edde2adabc3d21684d7d9dbeed46933bac37
                                                        • Opcode Fuzzy Hash: 4d84f2d8a28af6146276657e4ff016c645616e7175b957796272a327aa31a3a2
                                                        • Instruction Fuzzy Hash: 0F71F531600726AADB24BB35EC46FBA73A8EF6471CF18446AF505D7181FB70E94187B0
                                                        APIs
                                                        • VirtualQuery.KERNEL32(80000000,00D0682F,0000001C,00D06A24,00000000,?,?,?,?,?,?,?,00D0682F,00000004,00DDFB9C,00D06AB4), ref: 00D068FB
                                                        • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00D0682F,00000004,00DDFB9C,00D06AB4), ref: 00D06916
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: InfoQuerySystemVirtual
                                                        • String ID: D
                                                        • API String ID: 401686933-2746444292
                                                        • Opcode ID: 8f68092fde93546da5aab53dc0d687b0cf1fcfb8c3a09a210ef4d111776aef79
                                                        • Instruction ID: bf5ace5b878b1d5415f460ddf6605c6078b91ac89253e502572555910df3418d
                                                        • Opcode Fuzzy Hash: 8f68092fde93546da5aab53dc0d687b0cf1fcfb8c3a09a210ef4d111776aef79
                                                        • Instruction Fuzzy Hash: AC01F772A00209ABDF14DE29DC05BDE7BA9AFC4325F0CC220ED1DDB290EA34DC118A90
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D2E86A
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D2E8B4
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D2E97A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale$ErrorLast
                                                        • String ID:
                                                        • API String ID: 661929714-0
                                                        • Opcode ID: 0a9c5055f35bb5e0ecbcd54902d03b5156755b66a80deeed8d414a4ee75f9022
                                                        • Instruction ID: 006b38e035025087cf9e3c4082941fdaf764ac07487fdbb31a4afe921550b99e
                                                        • Opcode Fuzzy Hash: 0a9c5055f35bb5e0ecbcd54902d03b5156755b66a80deeed8d414a4ee75f9022
                                                        • Instruction Fuzzy Hash: E26194715002279FDB689F28EC82BBA77A8FF24318F18417AE905C6685E774D981DF70
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00D0D209
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00D0D213
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00D0D220
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: fbcb8608e363ec476cde1668ffde33731a26d4cddd4f0d0745f5c069630ccac1
                                                        • Instruction ID: e77c3d85913de07b39cf785f5674fc4736066bd657a573eaaeb072fd78685529
                                                        • Opcode Fuzzy Hash: fbcb8608e363ec476cde1668ffde33731a26d4cddd4f0d0745f5c069630ccac1
                                                        • Instruction Fuzzy Hash: F431B3749013189BCB21DF68DC89B8DBBB4AF08310F5041DAE40CA7291EB749B818F68
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: gfff
                                                        • API String ID: 0-1553575800
                                                        • Opcode ID: 9dda268794dd3365b89b01b4e000648b92b51f4880f13e6b30b1c81e6e6272ee
                                                        • Instruction ID: 1ef6612da54bc3e68f7088616518f1d66f5ae937ebfee8ade284af656a123b40
                                                        • Opcode Fuzzy Hash: 9dda268794dd3365b89b01b4e000648b92b51f4880f13e6b30b1c81e6e6272ee
                                                        • Instruction Fuzzy Hash: CF527C74D0424A8BDB05CF68C4907EDFBF2EF59301F2882EAD855AB351D734988ACB94
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D2EABD
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: fa0b98e78e5ed8b2b9d095f190cab5260ff72e56e06c69891f6fbf1659da6bdb
                                                        • Instruction ID: e7f8325e252442858393de46c12bf08ba21cd4cbe861918b01833b2ecc005f6c
                                                        • Opcode Fuzzy Hash: fa0b98e78e5ed8b2b9d095f190cab5260ff72e56e06c69891f6fbf1659da6bdb
                                                        • Instruction Fuzzy Hash: 9B219272604226ABDF289E25EC42EBA73A8EF55318F14007AFD02D7191EB75ED40DB74
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • EnumSystemLocalesW.KERNEL32(00D2E816,00000001,00000000,?,?,?,00D2EE47,00000000,?,?,?), ref: 00D2E762
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 9e527d107473dfd096d26f878ea215f0bb9b5c77db416e61d567960a4653035f
                                                        • Instruction ID: 982cf515753fc73b97d0ca75743e41470395e0c9a40d6f51fe352c02b1d49ee2
                                                        • Opcode Fuzzy Hash: 9e527d107473dfd096d26f878ea215f0bb9b5c77db416e61d567960a4653035f
                                                        • Instruction Fuzzy Hash: 8B11083B6047119FEB189F39E8916BAB791FF9035DB18442CE98787B40E371B942C760
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00D2EB13,00000000,00000000,?), ref: 00D2ECC4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: 16e4ba2fcf2fdb85a8a06d2ddfa28c67681c658c48425b1332a74abe59fb2e0c
                                                        • Instruction ID: ce3fb89c6214e1a74eb79ea8df0b184ce4b48ce091ecc9684c49e2fe94e90d49
                                                        • Opcode Fuzzy Hash: 16e4ba2fcf2fdb85a8a06d2ddfa28c67681c658c48425b1332a74abe59fb2e0c
                                                        • Instruction Fuzzy Hash: 72F0CD32500131BBDF285765DC4ABBA7758EB5075CF1D4829EC56A3180DA74FD41D5F0
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00D2E652
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID: utf8
                                                        • API String ID: 3736152602-905460609
                                                        • Opcode ID: d86f83ea831f253a6172b69bef30e7639c4c89ac049fa2e4ccfe814438841651
                                                        • Instruction ID: 57609984a16d432a3ebc4e207bc7f0548b917e4624be0ed3ae14630347610923
                                                        • Opcode Fuzzy Hash: d86f83ea831f253a6172b69bef30e7639c4c89ac049fa2e4ccfe814438841651
                                                        • Instruction Fuzzy Hash: A6F0C832610215ABCB14AB74EC46EBA33ACDF54319F14017AF507D7281EA78ED048774
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • EnumSystemLocalesW.KERNEL32(00D2EA69,00000001,?,?,?,?,00D2EE0B,?,?,?,?), ref: 00D2E7D5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: e8782162ddb71399258d95c3ccf4c3fa4bba393eed37b030a58d15481634c69b
                                                        • Instruction ID: c0865a05949389cc9babffc4f5c799fad5d799305da3d92991ae25e97e51acd5
                                                        • Opcode Fuzzy Hash: e8782162ddb71399258d95c3ccf4c3fa4bba393eed37b030a58d15481634c69b
                                                        • Instruction Fuzzy Hash: 14F0C2362003149FDB145F75E891A7A7B95FF8076CF09442DF9058B680D671AC01C670
                                                        APIs
                                                          • Part of subcall function 00D243B1: RtlEnterCriticalSection.NTDLL(-00DE0160), ref: 00D243C0
                                                        • EnumSystemLocalesW.KERNEL32(00D27CC6,00000001,00DCFA10,0000000C,00D28135,00000000), ref: 00D27D0B
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                        • String ID:
                                                        • API String ID: 1272433827-0
                                                        • Opcode ID: 0da2f8ec94b05770bd1ebc931b0e212c8f2c597c6aaf725af874b5b31d8c58c6
                                                        • Instruction ID: 4027d25c8224e29528a1529c522b33cf7126aef92865cb55093c93db86de5659
                                                        • Opcode Fuzzy Hash: 0da2f8ec94b05770bd1ebc931b0e212c8f2c597c6aaf725af874b5b31d8c58c6
                                                        • Instruction Fuzzy Hash: C4F0C972A44714EFD710EF58E842B9977B1EB44725F10812AE815DB3A1CAB599448F60
                                                        APIs
                                                          • Part of subcall function 00D25250: GetLastError.KERNEL32(?,00000008,00D1C949), ref: 00D25254
                                                          • Part of subcall function 00D25250: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00D252F6
                                                        • EnumSystemLocalesW.KERNEL32(00D2E5FE,00000001,?,?,?,00D2EE69,?,?,?,?), ref: 00D2E6DC
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 529207d65f11ac82a3f152df419d6f93ee7b2e0b1145b3cc2826984565d88a76
                                                        • Instruction ID: 9947d86e92bd709e4d26135fc7deeab85527065c23de4efc8e637b673ade8fc3
                                                        • Opcode Fuzzy Hash: 529207d65f11ac82a3f152df419d6f93ee7b2e0b1145b3cc2826984565d88a76
                                                        • Instruction Fuzzy Hash: 32F0553630021597CB149F39E845A6ABF94EFE1729B0A0058EA0A8B290C631D842C7B0
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?,?,?,00D21A80,?,20001004,00000000,00000002), ref: 00D282C4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: cd0c392e69b68d39502cb84fdaee50952e300f442dd037c4d6347e1baa121e66
                                                        • Instruction ID: 56329cc9aeb63e1ae36c3ad1ab312416454db634f5dd7e4038308f14b3894625
                                                        • Opcode Fuzzy Hash: cd0c392e69b68d39502cb84fdaee50952e300f442dd037c4d6347e1baa121e66
                                                        • Instruction Fuzzy Hash: 69E04F35501628FBCF122F60EC05EAE3E1AEF64766F054010FD1566221CB75C921AAF4
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a17970b61489502ba60a40ba5fe6d5ed7b00a4b343cb89e20bd7a194d5aceb0
                                                        • Instruction ID: a9d0fbe013d427aefba591bb20b0b5ff4aeb6179e1120b7773b93cd2de59bd9f
                                                        • Opcode Fuzzy Hash: 4a17970b61489502ba60a40ba5fe6d5ed7b00a4b343cb89e20bd7a194d5aceb0
                                                        • Instruction Fuzzy Hash: E2E04632915238EBCB24DB89991598AF2ECEB44B18F15049AB511E3100C270DE40CBE0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ba09cb2b25d7ad3c5c86da38ba895a255f370f433b8eabb3635a0f4d1c6449a9
                                                        • Instruction ID: cadb65123fd0c751804765aa4e419349d8b9ce9321048fab2541c74db38cbe24
                                                        • Opcode Fuzzy Hash: ba09cb2b25d7ad3c5c86da38ba895a255f370f433b8eabb3635a0f4d1c6449a9
                                                        • Instruction Fuzzy Hash: 3DC08CB4090D605ADE29D914A2F13E83356E3A1F82F88248CC4030BA43CD1EECC3EA30
                                                        APIs
                                                        • __EH_prolog3_catch.LIBCMT ref: 00BD27C9
                                                        • RtlEnterCriticalSection.NTDLL(00000000), ref: 00BD27DA
                                                        • TlsGetValue.KERNEL32(?,?,00000000,?,?,00000002,?,?,?,00B478FA,?,807DFC22), ref: 00BD27F6
                                                        • LocalAlloc.KERNEL32(00000000,00000000,00000010,?,?,00000000,?,?,00000002,?,?,?,00B478FA,?,807DFC22), ref: 00BD285F
                                                        • LocalReAlloc.KERNEL32(?,00000000,00000002,00000010,?,?,00000000,?,?,00000002,?,?,?,00B478FA,?,807DFC22), ref: 00BD286D
                                                        • TlsSetValue.KERNEL32(?,00000000,807DFC22), ref: 00BD289E
                                                        • RtlLeaveCriticalSection.NTDLL(00B478FA), ref: 00BD28BC
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AllocCriticalLocalSectionValue$EnterH_prolog3_catchLeave
                                                        • String ID:
                                                        • API String ID: 1707010094-0
                                                        • Opcode ID: 9ad0b5a28677820268ae6a05daf35cd66c67a0b9858871b7c2a5259838fd175d
                                                        • Instruction ID: b82a48f5bc996f1a6eb5238eaf9cce7a320755af36bdfdfa38926415f24990ee
                                                        • Opcode Fuzzy Hash: 9ad0b5a28677820268ae6a05daf35cd66c67a0b9858871b7c2a5259838fd175d
                                                        • Instruction Fuzzy Hash: 0251A970900B449FCB24DF15C885B6ABBF0FF10310F1085AEE95A9B7A1EB71E900CBA0
                                                        APIs
                                                        • GetLastError.KERNEL32(?,00000029,00000000,00000000,00000000,00000000,807DFC22,00000000,00000000), ref: 00B43582
                                                        • GetLastError.KERNEL32 ref: 00B435D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID: Basic$Digest$NTLM$Negotiate$Passport
                                                        • API String ID: 1452528299-3737144375
                                                        • Opcode ID: 0d2464d3dda777f6f238cbe277eb512edd5ab955daccf78a5a403602bf24abcc
                                                        • Instruction ID: 2c136008d957c0f9f9505ff9d0680bc91e94b296fc99761c1ea45bebdf003303
                                                        • Opcode Fuzzy Hash: 0d2464d3dda777f6f238cbe277eb512edd5ab955daccf78a5a403602bf24abcc
                                                        • Instruction Fuzzy Hash: 4A51E471A04209ABDB14CFA8CC42BEEBBF0EF58B10F184159E905B72C1E771A644CB71
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 00D0A1B7
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00D0A1BF
                                                        • _ValidateLocalCookies.LIBCMT ref: 00D0A248
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00D0A273
                                                        • _ValidateLocalCookies.LIBCMT ref: 00D0A2C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: c6d3b230ae5c4e2958217111e33cdef2bff5b8371f2fe09be890985593a37a9f
                                                        • Instruction ID: 0417fc44f2f5dfb258ca6835601ef6c0688a8db150683744c40313b1b1ab244e
                                                        • Opcode Fuzzy Hash: c6d3b230ae5c4e2958217111e33cdef2bff5b8371f2fe09be890985593a37a9f
                                                        • Instruction Fuzzy Hash: 4D419F34A00309ABCF10DF6CC885B9E7BA5EF45324F188165E91D9B392D736DA05CBB6
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,74DF2F60,?,?,?,?,?), ref: 00B980EF
                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?), ref: 00B9813E
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 00B98148
                                                        Strings
                                                        • Failed to convert WideCharToMultiByte. ErrorCode::%d, xrefs: 00B9814F
                                                        • StringUtils, xrefs: 00B98112, 00B98159
                                                        • Error allocating memory while converting Native string to UTF8 string, xrefs: 00B98108
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID: Error allocating memory while converting Native string to UTF8 string$Failed to convert WideCharToMultiByte. ErrorCode::%d$StringUtils
                                                        • API String ID: 1717984340-36406343
                                                        • Opcode ID: ae95f5bde8d6d0ec8ef987e72cf8fc027990f329f15fca01cc7b20637688b7f1
                                                        • Instruction ID: 1865c93461b0e2db3725dc0ea6196f8d08881fb957450cccef19e8fcfd056229
                                                        • Opcode Fuzzy Hash: ae95f5bde8d6d0ec8ef987e72cf8fc027990f329f15fca01cc7b20637688b7f1
                                                        • Instruction Fuzzy Hash: C821EB367853147AEA2076A85C07FBB3B98CF97B21F1402A5FD04B72C2D9E1590642B6
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,00D27FA9,00000000,?,00000000,00000000,?,?,00D28213,00000021,FlsSetValue,00D8DB34,00D8DB3C,00000000), ref: 00D27F5D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3664257935-537541572
                                                        • Opcode ID: 6b29eb52634ff59ea8a2d2e81dc1bdc1735918e9ade67470c3053f83e83989c3
                                                        • Instruction ID: bfffd7c5eda2ffd53f4af133cd475b7bc5e3898f209579fe1f053dfaf54cb966
                                                        • Opcode Fuzzy Hash: 6b29eb52634ff59ea8a2d2e81dc1bdc1735918e9ade67470c3053f83e83989c3
                                                        • Instruction Fuzzy Hash: AB21F335A09321ABDB319B60BD81A5A3768EF65768F280150F915E73D0EB30ED01C6F0
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00D068B0,00D06813,00D06AB4), ref: 00D0684C
                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00D06862
                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00D06877
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                        • API String ID: 667068680-1718035505
                                                        • Opcode ID: 5eb2102eb99c068352124d88253348a0c330636819b62796d8927fe5ebc33fec
                                                        • Instruction ID: f8da61c1d9965709d8b717b74594ac1229561e77b9d456746f5d9b1a105e6c8e
                                                        • Opcode Fuzzy Hash: 5eb2102eb99c068352124d88253348a0c330636819b62796d8927fe5ebc33fec
                                                        • Instruction Fuzzy Hash: D0F0AF71B423226BDF315FA09DA07BA63889A457A139D813AFC4AE32C0E610CC9457B0
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B4B4FD
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B4B51F
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4B547
                                                        • __Getctype.LIBCPMT ref: 00B4B627
                                                        • std::_Facet_Register.LIBCPMT ref: 00B4B669
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4B693
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                        • String ID:
                                                        • API String ID: 1102183713-0
                                                        • Opcode ID: 3a0cf564992e15cfb249a5906c1a670dfbefd97d153e09a08a35863fa0bf9386
                                                        • Instruction ID: 5d757beb67b54b7e07a488f1a1628ed63d503b5daf5539aa539253cdb03e539a
                                                        • Opcode Fuzzy Hash: 3a0cf564992e15cfb249a5906c1a670dfbefd97d153e09a08a35863fa0bf9386
                                                        • Instruction Fuzzy Hash: 57616AB1D05248CFDB10CF58C891BAEBBF4EB14710F248299D946AB381DB74AA45DBA1
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00DE0C50,000000FF,00000000,00000000,00000405,?,?,00000000,00000038,?), ref: 00B981CB
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00DE0C50,000000FF,00000000,?,?,?,?,?,?,?,?,?,?,00D99834), ref: 00B9821B
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00D99834,?,?,00000000,00000000,0000000D), ref: 00B98225
                                                        Strings
                                                        • StringUtils, xrefs: 00B981F5, 00B98236
                                                        • Error allocating memory while converting UTF8 string to Native string, xrefs: 00B981EB
                                                        • Failed to convert MultiByteToWideChar. ErrorCode::%d, xrefs: 00B9822C
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID: Error allocating memory while converting UTF8 string to Native string$Failed to convert MultiByteToWideChar. ErrorCode::%d$StringUtils
                                                        • API String ID: 1717984340-281077328
                                                        • Opcode ID: 98aa6152b4c99b22067d91a7e3707026b45f23efb588dba4f5349688fc5b48b2
                                                        • Instruction ID: eed0caca477b52fd18eee608e2c7b7997e7b4bd4433977ce08d711338701831f
                                                        • Opcode Fuzzy Hash: 98aa6152b4c99b22067d91a7e3707026b45f23efb588dba4f5349688fc5b48b2
                                                        • Instruction Fuzzy Hash: EA213E36B853143BCB207BA46C07F9B37D8DF86711F1402A9FD09E72C2D9A1550582B5
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,807DFC22,00000000,?,00000000,00D440B0,000000FF,?,00D1C4FE,?,?,00D1C4D2,00000000), ref: 00D1C5A3
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D1C5B5
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00D440B0,000000FF,?,00D1C4FE,?,?,00D1C4D2,00000000), ref: 00D1C5D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 1500d54ffbdda15b3d6c7c3c74eab52fb5eb78309b35544f1fe062cd21cbf4da
                                                        • Instruction ID: a7871cf4b3f273e09cdc93edb5024105d7dda06407f17235245e0cfc9fc3accf
                                                        • Opcode Fuzzy Hash: 1500d54ffbdda15b3d6c7c3c74eab52fb5eb78309b35544f1fe062cd21cbf4da
                                                        • Instruction Fuzzy Hash: A9018F32994719EFEB118F50EC09BAEB7B9FB04B11F444225F811E2290DB749940CAB0
                                                        APIs
                                                        • _memcpy_s.LIBCMT ref: 00BBD5DC
                                                        • GlobalLock.KERNEL32(00000000), ref: 00BBD605
                                                        • lstrcmpW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00BD9208,000000F1,00000010,00BD9BCF,00DC2A3C,00000010,00000008,00BD9922), ref: 00BBD61E
                                                        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,?,?,?), ref: 00BBD65B
                                                        • GlobalLock.KERNEL32(00000000), ref: 00BBD669
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Global$Lock$Alloc_memcpy_slstrcmp
                                                        • String ID:
                                                        • API String ID: 1877131249-0
                                                        • Opcode ID: 78b3817e904568167ad90e8621f8c89afc868a882475728b6178d8da3cfc3171
                                                        • Instruction ID: d729f051e6cca877ec00e2bbc5f45d62c6676cce48cb0c42d97825ddc20747dc
                                                        • Opcode Fuzzy Hash: 78b3817e904568167ad90e8621f8c89afc868a882475728b6178d8da3cfc3171
                                                        • Instruction Fuzzy Hash: 8A41B571600618EFDB119F64CC85EBABBEDEF04740B44009AF906D7261EB75ED10CBA0
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00D07DCD
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00D07DD8
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00D07E46
                                                          • Part of subcall function 00D07F28: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D07F40
                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00D07DF3
                                                        • _Yarn.LIBCPMT ref: 00D07E09
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                        • String ID:
                                                        • API String ID: 1088826258-0
                                                        • Opcode ID: 41442ef83219fd16a346e087ded75c46d8a1b504533176da948192a24724d53b
                                                        • Instruction ID: a3c535171be0d0b8272c9dedc8f6db3d42f289c9588174465f999afa44c51f68
                                                        • Opcode Fuzzy Hash: 41442ef83219fd16a346e087ded75c46d8a1b504533176da948192a24724d53b
                                                        • Instruction Fuzzy Hash: BF017C75A056159BC706EB20D84577D7BA2FF84341B18004AEC0A9B3D1CF74AE42CBF5
                                                        APIs
                                                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00B48719
                                                          • Part of subcall function 00D0982C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00B383CC,?,?,?,?,00B383CC,00000000,00DCFBE8,00000000,00000000,?,00B9863E,?), ref: 00D0988C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                        • API String ID: 1903096808-1866435925
                                                        • Opcode ID: a722f080d214d6b7781b65acfd0def844aaa7e920b5736fee651ebd7c713befa
                                                        • Instruction ID: da63283c1b4870775bf173b316af6b8e6a2df714d9da030f4d82254b714b3111
                                                        • Opcode Fuzzy Hash: a722f080d214d6b7781b65acfd0def844aaa7e920b5736fee651ebd7c713befa
                                                        • Instruction Fuzzy Hash: 4311C8B29446046BCB10DF58DC52BAA73D8EB05710F0485AAFD58873C1EE359A04D7F5
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(807DFC22,00D267ED,00000000,?), ref: 00D25BBE
                                                          • Part of subcall function 00D2C732: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00D29517,?,00000000,-00000008), ref: 00D2C7DE
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D25E19
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D25E61
                                                        • GetLastError.KERNEL32 ref: 00D25F04
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: a280c7a67e6f72621a84290d8a4e2a493ed3d948de1d5f628e1cb91a78a55020
                                                        • Instruction ID: d164d86a5378552699aa001d3bfabb693a04ba7fd542e9e43271c6af8e2ebfad
                                                        • Opcode Fuzzy Hash: a280c7a67e6f72621a84290d8a4e2a493ed3d948de1d5f628e1cb91a78a55020
                                                        • Instruction Fuzzy Hash: 50D18A75D006589FCF05CFA8E880AADBBB4FF18318F18462AE855EB355E730A945CF60
                                                        APIs
                                                        • RtlEnterCriticalSection.NTDLL(00DDDEC0), ref: 00BD77D6
                                                        • RtlInitializeCriticalSection.NTDLL(00000000), ref: 00BD77EC
                                                        • RtlLeaveCriticalSection.NTDLL(00DDDEC0), ref: 00BD77FA
                                                        • RtlEnterCriticalSection.NTDLL(00000000), ref: 00BD7807
                                                          • Part of subcall function 00BD773C: RtlInitializeCriticalSection.NTDLL(00DDDEC0), ref: 00BD7754
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterInitialize$Leave
                                                        • String ID:
                                                        • API String ID: 713024617-0
                                                        • Opcode ID: 2da31c1f6c3762f3a9f369f6624792bbdde707bf249f7da6d5f1e9a5b8135021
                                                        • Instruction ID: 34e2ebbc219c620ceb9392cff2c6c80892693f928bbcd5fde21213f09ebcc28e
                                                        • Opcode Fuzzy Hash: 2da31c1f6c3762f3a9f369f6624792bbdde707bf249f7da6d5f1e9a5b8135021
                                                        • Instruction Fuzzy Hash: C8F062729053189BDF002B54EC88AA9BBAEEB62726F840467F941D7311EB31CC41CAB5
                                                        APIs
                                                        • RtlEnterCriticalSection.NTDLL(00DDDCA0), ref: 00BD2727
                                                        • TlsGetValue.KERNEL32(00DDDC84,?,?,?,?,00BD2717,00000000,00000004,00BCFF21,00BBC3C6,00BCD7F3,00B41B52,00000002,?,?,?), ref: 00BD273B
                                                        • RtlLeaveCriticalSection.NTDLL(00DDDCA0), ref: 00BD2755
                                                        • RtlLeaveCriticalSection.NTDLL(00DDDCA0), ref: 00BD2760
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$Leave$EnterValue
                                                        • String ID:
                                                        • API String ID: 3969253408-0
                                                        • Opcode ID: 8bb384cfa368fc111ca0a9b69f8334ef5b968414d1193e530af4fdc1b19327e8
                                                        • Instruction ID: b701ff03ba66c9ebe6a0aea2ddbb681da711274f1a26634aa8ae22625e3ec6c1
                                                        • Opcode Fuzzy Hash: 8bb384cfa368fc111ca0a9b69f8334ef5b968414d1193e530af4fdc1b19327e8
                                                        • Instruction Fuzzy Hash: 83F0B436200358AFCB205F15DD8886AFBACFE257623054496E926D7716DB30EC06CBB1
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00D267ED,00000000,00000000,00000000,?,00D313F1,00000000,00000001,00000000,?,?,00D25F58,?,00D267ED,00000000), ref: 00D347A2
                                                        • GetLastError.KERNEL32(?,00D313F1,00000000,00000001,00000000,?,?,00D25F58,?,00D267ED,00000000,?,?,?,00D26516,00D34918), ref: 00D347AE
                                                          • Part of subcall function 00D34774: CloseHandle.KERNEL32(FFFFFFFE,00D347BE,?,00D313F1,00000000,00000001,00000000,?,?,00D25F58,?,00D267ED,00000000,?,?), ref: 00D34784
                                                        • ___initconout.LIBCMT ref: 00D347BE
                                                          • Part of subcall function 00D34736: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00D34765,00D313DE,?,?,00D25F58,?,00D267ED,00000000,?), ref: 00D34749
                                                        • WriteConsoleW.KERNEL32(00000000,00D267ED,00000000,00000000,?,00D313F1,00000000,00000001,00000000,?,?,00D25F58,?,00D267ED,00000000,?), ref: 00D347D3
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: 6eef89aa99a998cb3efb252c45fbf5107116d3aabbe957c79951996c0d1d5f29
                                                        • Instruction ID: 33928f3e686ae9e4b610b8159f8982e6347e555c3a1692abc4eb47b11c07e0ec
                                                        • Opcode Fuzzy Hash: 6eef89aa99a998cb3efb252c45fbf5107116d3aabbe957c79951996c0d1d5f29
                                                        • Instruction Fuzzy Hash: DCF0C036501265BBCF221F95DC08D993F66FB0A3A1F454110FE59D6631D732E8209BF0
                                                        APIs
                                                        • SleepConditionVariableCS.KERNELBASE(?,00D0544D,00000064), ref: 00D054D3
                                                        • RtlLeaveCriticalSection.NTDLL(00DDF800), ref: 00D054DD
                                                        • WaitForSingleObjectEx.KERNEL32(?,00000000,?,00D0544D,00000064,?,00B385B1,00DE0C2C,807DFC22,00000000,00D363D1,000000FF,?,00B461F5,HTTPSend_01,0000000B), ref: 00D054EE
                                                        • RtlEnterCriticalSection.NTDLL(00DDF800), ref: 00D054F5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                        • String ID:
                                                        • API String ID: 3269011525-0
                                                        • Opcode ID: bf22dc2e50dc8620e5fb81e5bdbbddaf6e0022ba612c2cdfc0e04b91ccc04aee
                                                        • Instruction ID: 6a2f7fe5febcb8db73fd1f76762f0102d4070ae0fc9edae469a7f447903aa9a2
                                                        • Opcode Fuzzy Hash: bf22dc2e50dc8620e5fb81e5bdbbddaf6e0022ba612c2cdfc0e04b91ccc04aee
                                                        • Instruction Fuzzy Hash: 58E0ED31645724BBC7011B54EC09AD93B14EF05B52B644032FE0A97360C76199409BF5
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00B47F6B
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B47FCE
                                                          • Part of subcall function 00D07EC3: _Yarn.LIBCPMT ref: 00D07EE2
                                                          • Part of subcall function 00D07EC3: _Yarn.LIBCPMT ref: 00D07F06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4170156045.0000000000B31000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                        • Associated: 00000002.00000002.4170099433.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DD5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000DE2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E4F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E5E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E69000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000E83000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F21000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4170156045.0000000000F58000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171380435.0000000000F6F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000002.00000002.4171417182.0000000000F70000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b30000_Reader_Install_Setup.jbxd
                                                        Similarity
                                                        • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                        • String ID: bad locale name
                                                        • API String ID: 1908188788-1405518554
                                                        • Opcode ID: b02b192be05bab184071c9d3eafdd21ddf1e0099b86462a2d9d2c99c0a76ed4d
                                                        • Instruction ID: b742495310994795ab231bf0c4aec370b9739120333a906d66cd5cf10d9efe2f
                                                        • Opcode Fuzzy Hash: b02b192be05bab184071c9d3eafdd21ddf1e0099b86462a2d9d2c99c0a76ed4d
                                                        • Instruction Fuzzy Hash: D821D270809784DED721CF68C90474BBFF4EF15714F10869EE49997B81D7B5A608CBA1

                                                        Execution Graph

                                                        Execution Coverage:6.2%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:16.7%
                                                        Total number of Nodes:90
                                                        Total number of Limit Nodes:4
                                                        execution_graph 41199 22e66005360 41200 22e661bde88 41199->41200 41201 22e6600539d GetSystemInfo 41200->41201 41202 22e660053aa 41201->41202 41203 22e65fd6627 41204 22e65fd663a DisableThreadLibraryCalls CreateEventW 41203->41204 41205 22e65fd667b 41203->41205 41207 22e661174c8 41204->41207 41208 22e661174e1 41207->41208 41209 22e661174f8 41207->41209 41230 22e66116cc8 SetLastError SetLastError GetProcAddress _invalid_parameter_noinfo 41208->41230 41223 22e66117468 41209->41223 41212 22e661174e6 41231 22e66115f98 SetLastError SetLastError GetProcAddress _invalid_parameter_noinfo 41212->41231 41215 22e6611750b CreateThread 41216 22e66117548 41215->41216 41217 22e6611753b try_get_function 41215->41217 41218 22e661174f1 41216->41218 41219 22e6611755e try_get_function 41216->41219 41220 22e66117558 CloseHandle 41216->41220 41232 22e66116c58 SetLastError SetLastError GetProcAddress _invalid_parameter_noinfo __free_lconv_mon 41217->41232 41218->41205 41233 22e66126240 41219->41233 41220->41219 41237 22e6612253c 41223->41237 41226 22e66126240 __free_lconv_mon 3 API calls 41227 22e66117494 41226->41227 41228 22e661174b5 41227->41228 41229 22e6611749b GetModuleHandleExW 41227->41229 41228->41215 41228->41216 41229->41228 41230->41212 41231->41218 41232->41216 41234 22e66126245 __free_lconv_mon 41233->41234 41236 22e66126265 __free_lconv_mon try_get_function 41233->41236 41234->41236 41242 22e66116cc8 SetLastError SetLastError GetProcAddress _invalid_parameter_noinfo 41234->41242 41236->41218 41240 22e6612254d __crtCompareStringA new std::locale::_Locimp::_Locimp_Addfac 41237->41240 41239 22e6611748a 41239->41226 41240->41239 41241 22e66116cc8 SetLastError SetLastError GetProcAddress _invalid_parameter_noinfo 41240->41241 41241->41239 41242->41236 41243 22e65ff59b7 41244 22e65ff59c9 41243->41244 41245 22e65ff59d0 41243->41245 41255 22e660a81a0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry 41244->41255 41254 22e65ff5a18 41245->41254 41256 22e660a9bd0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry 41245->41256 41248 22e65ff59dd 41257 22e65fc6f94 SetLastError SetLastError GetProcAddress __std_exception_copy 41248->41257 41250 22e65ff59ea 41258 22e660a9f30 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry 41250->41258 41252 22e65ff5a03 41259 22e66114da0 RaiseException shared_ptr 41252->41259 41255->41245 41256->41248 41257->41250 41258->41252 41259->41254 41260 22e65fc5ac8 41265 22e660f32ec 41260->41265 41263 22e65fc5b03 41264 22e65fc5aef WSAStartup 41264->41263 41268 22e660f329c 41265->41268 41267 22e65fc5adb 41267->41263 41267->41264 41269 22e660f32cb 41268->41269 41271 22e660f32c1 _onexit 41268->41271 41272 22e66129f30 5 API calls _onexit 41269->41272 41271->41267 41272->41271 41273 22e65ff9c35 41274 22e65ff9c45 41273->41274 41275 22e65ff9c5f 41274->41275 41277 22e65ffd3a0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry 41274->41277 41277->41275 41278 22e65ca6000 41279 22e65ca6042 41278->41279 41280 22e65ca6460 VirtualAlloc 41279->41280 41288 22e65ca61cc 41279->41288 41281 22e65ca6598 41280->41281 41289 22e65ca9480 VirtualProtect VirtualProtect 41281->41289 41283 22e65ca6718 41290 22e65ca9480 VirtualProtect VirtualProtect 41283->41290 41285 22e65ca673d 41291 22e65ca9480 VirtualProtect VirtualProtect 41285->41291 41287 22e65ca6762 LoadLibraryExW 41287->41288 41289->41283 41290->41285 41291->41287 41292 22e65ca9390 41293 22e65ca93b7 41292->41293 41299 22e65ca9480 VirtualProtect VirtualProtect 41293->41299 41295 22e65ca9403 NtOpenFile 41296 22e65ca944a 41295->41296 41297 22e65ca9439 41295->41297 41300 22e65ca9480 VirtualProtect VirtualProtect 41296->41300 41299->41295 41300->41297 41301 22e65ca8d40 41309 22e65ca9480 VirtualProtect VirtualProtect 41301->41309 41303 22e65ca8d82 41304 22e65ca92e4 41303->41304 41306 22e65ca8db0 NtCreateSection 41303->41306 41310 22e65ca9480 VirtualProtect VirtualProtect 41304->41310 41307 22e65ca8e80 NtMapViewOfSection 41306->41307 41308 22e65ca8e76 41306->41308 41307->41308 41309->41303 41310->41308 41311 22e65ca8c31 41318 22e65ca9480 VirtualProtect VirtualProtect 41311->41318 41314 22e65ca8d06 41319 22e65ca9480 VirtualProtect VirtualProtect 41314->41319 41315 22e65ca8cf5 41317 22e65ca8c81 NtCreateSection 41317->41314 41317->41315 41318->41317 41319->41315
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$Deallocateclosesocketstd::_$getsockoptsocket$connectfreeaddrinfogetaddrinfoioctlsocketselectsetsockopt
                                                        • String ID: : wsaerror=$ ai_family = $ ai_protocol = $ ai_socktype = $ failed : wsaerror=$ type= $(Connector::NewConnect) Attempt to connect to $(Connector::NewConnect) Connection alredy exist$(Connector::NewConnect) Set non-blocking mode failed : wsaerror=$(Connector::NewConnect) Setup connection parameters failed - $(Connector::NewConnect) Setup socket option failed : wsaerror=$(Connector::NewConnect) Socket is not set in write - wsaerror= $(Connector::NewConnect) Timeout for connect is out : wsaerror=$(Connector::NewConnect)Create socket failed : wsaerror=$L'
                                                        • API String ID: 1663791422-4130243403
                                                        • Opcode ID: fe1debe53bb62fb23178981888ee4f248a1ab2c89319792f8000e5fc88491f56
                                                        • Instruction ID: 068f29e56552c7285675fd63f475003ef61a99d72e0a28c6cf8a3c9e9f6ce654
                                                        • Opcode Fuzzy Hash: fe1debe53bb62fb23178981888ee4f248a1ab2c89319792f8000e5fc88491f56
                                                        • Instruction Fuzzy Hash: 7D62C2A1631640B9EF50EBE2D85C3FE7368F7A1754F122525AA2D43ADADF38C944E700

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 359 22e65fd505c-22e65fd5129 call 22e66117640 call 22e66117364 WaitForSingleObject 365 22e65fd512b-22e65fd512e 359->365 366 22e65fd5130 359->366 368 22e65fd513c-22e65fd5186 call 22e65fc67ec call 22e65fc6e78 365->368 367 22e65fd5133-22e65fd513a 366->367 367->367 367->368 373 22e65fd518d 368->373 374 22e65fd5188-22e65fd518b 368->374 376 22e65fd5190-22e65fd5197 373->376 375 22e65fd5199-22e65fd51c8 call 22e65fc67ec 374->375 379 22e65fd51ca-22e65fd51cd 375->379 380 22e65fd51cf 375->380 376->375 376->376 381 22e65fd51db-22e65fd520a call 22e65fc67ec 379->381 382 22e65fd51d2-22e65fd51d9 380->382 385 22e65fd520c-22e65fd520f 381->385 386 22e65fd5211 381->386 382->381 382->382 388 22e65fd521d-22e65fd524c call 22e65fc67ec call 22e65fd3814 385->388 387 22e65fd5214-22e65fd521b 386->387 387->387 387->388 393 22e65fd525d-22e65fd5270 388->393 394 22e65fd524e-22e65fd5258 call 22e65fc615c 388->394 396 22e65fd5272-22e65fd527c call 22e65fc615c 393->396 397 22e65fd5281-22e65fd52d2 call 22e661188b0 * 2 393->397 394->393 396->397 403 22e65fd52d9 397->403 404 22e65fd52d4-22e65fd52d7 397->404 405 22e65fd52dc-22e65fd52e3 403->405 406 22e65fd52e5-22e65fd5311 call 22e65fc67ec 404->406 405->405 405->406 409 22e65fd5318 406->409 410 22e65fd5313-22e65fd5316 406->410 412 22e65fd531b-22e65fd5322 409->412 411 22e65fd5324-22e65fd5363 call 22e65fc67ec call 22e65fd3a70 410->411 417 22e65fd5365-22e65fd536f call 22e65fc615c 411->417 418 22e65fd5374-22e65fd538c 411->418 412->411 412->412 417->418 420 22e65fd539d-22e65fd54a2 call 22e65fc6ecc CoInitializeEx CoInitializeSecurity call 22e65fd3f84 call 22e65ff0b00 call 22e65ff0800 call 22e65fd68cc call 22e66114a00 call 22e65fc17c0 * 2 call 22e65fc1810 call 22e65fc37f0 call 22e65fc1640 call 22e65fc1000 418->420 421 22e65fd538e-22e65fd5398 call 22e65fc615c 418->421 447 22e65fd54a4-22e65fd54aa CoUninitialize 420->447 448 22e65fd54af-22e65fd5a12 call 22e661174c8 call 22e65fd6870 * 2 call 22e65ff0c80 call 22e65ff0980 call 22e65fc68ec call 22e65fc6718 call 22e65fd1978 call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec 420->448 421->420 449 22e65fd651a-22e65fd65a7 call 22e65fc65bc * 4 call 22e65fd1810 * 2 call 22e65fc65bc * 3 447->449 524 22e65fd5a16-22e65fd5a1d 448->524 524->524 525 22e65fd5a1f-22e65fd5ac9 call 22e65fc67ec call 22e65fc68ec * 2 call 22e65fd002c call 22e65fd114c call 22e65fd1158 call 22e65fd1220 524->525 540 22e65fd5ad0-22e65fd5adb call 22e65fd1a6c call 22e65fd1c8c 525->540 544 22e65fd5ae0-22e65fd5af2 call 22e65fd039c 540->544 546 22e65fd5af7-22e65fd5af9 544->546 547 22e65fd5afb-22e65fd5b02 546->547 548 22e65fd5b04-22e65fd5ebe call 22e65fd0e8c call 22e65fd0f18 call 22e65fd044c call 22e65fd1a6c call 22e65fd1c8c call 22e65fe6e04 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd0fc0 546->548 547->540 583 22e65fd5f02-22e65fd6135 call 22e65fd100c call 22e65fd1a6c call 22e65fd1c8c call 22e65fed7b4 call 22e65fc8558 call 22e65fd1a6c call 22e65fd1884 call 22e65fd0f6c call 22e65fe6738 call 22e65fc65bc call 22e65fd0fc0 548->583 584 22e65fd5ec0-22e65fd5ee0 call 22e65fd1a6c call 22e65fd1c8c 548->584 642 22e65fd613b-22e65fd613f 583->642 643 22e65fd640c-22e65fd643b call 22e65fc65bc * 2 call 22e65fd32a0 call 22e65fc65bc * 2 583->643 595 22e65fd5ee2-22e65fd5eec call 22e65fc615c 584->595 596 22e65fd5ef1-22e65fd5efd 584->596 595->596 599 22e65fd6440-22e65fd644f call 22e65fd1128 596->599 605 22e65fd646c-22e65fd6519 call 22e65feab40 call 22e65ff07f0 call 22e65fd01b0 call 22e65fc65bc * 3 call 22e65fcfb70 call 22e65fc65bc * 2 call 22e65fd67e0 call 22e65fc65bc * 5 599->605 606 22e65fd6451-22e65fd6454 599->606 605->449 606->544 609 22e65fd645a-22e65fd6467 call 22e65fed970 606->609 609->544 645 22e65fd6194-22e65fd61c6 call 22e65fd1a6c call 22e65fd1884 call 22e65fd68b8 call 22e65fd100c 642->645 646 22e65fd6141-22e65fd615f 642->646 643->599 645->643 674 22e65fd61cc-22e65fd621a call 22e65fd1a6c call 22e65fd1884 call 22e65fc6680 * 2 call 22e65fed3cc 645->674 646->645 651 22e65fd6166 call 22e65fe7140 646->651 651->645 690 22e65fd621c-22e65fd623f call 22e65fd1a6c call 22e65fd1884 call 22e65fd10f8 674->690 691 22e65fd6244-22e65fd6269 call 22e65fd1164 call 22e65fd3808 674->691 701 22e65fd63f2-22e65fd640b call 22e65fc65bc * 2 690->701 691->701 702 22e65fd626f-22e65fd62a4 call 22e65fd12a4 call 22e65fd1298 call 22e65fd1280 691->702 701->643 702->701 715 22e65fd62aa-22e65fd6385 call 22e65fd1294 call 22e65fc63a4 call 22e65fd0f6c call 22e65fd4f0c call 22e65fc65bc call 22e65fd136c 702->715 728 22e65fd6387-22e65fd63b4 call 22e65fd6698 715->728 729 22e65fd63b8-22e65fd63e5 call 22e65fc65bc call 22e65fd668c call 22e65fd1280 715->729 728->729 729->715 739 22e65fd63eb 729->739 739->701
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorExitLastObjectSingleThreadWait
                                                        • String ID: .live$300$Failed DoHandshake$NEW_BLACK$SrvResponseStatus != 1$Starting connection loop$Trusted connection started$UnpackJsonToPong$UnpackJsonToTasks$dex$dij$gdt$generate_ping$generate_request$generate_sys_info_hit passed$ins$kSevFxr92Wwmuht3RfZcQHYiz4pj087CNKdlaL5D$plg$sdl$shi
                                                        • API String ID: 1181180325-1389462401
                                                        • Opcode ID: 704ea699bb37593799e970bc278b9b1975cc6b7e2285913e5d0d90780658397d
                                                        • Instruction ID: 922c3e2045cd80b80288a4df9648d0ef53b06cf446d4ead4cdd6ab6aa2ad0c3b
                                                        • Opcode Fuzzy Hash: 704ea699bb37593799e970bc278b9b1975cc6b7e2285913e5d0d90780658397d
                                                        • Instruction Fuzzy Hash: D4A23866710B80ADEF20EFB5EC442ED37A8F761348F420615DB495BAAADF34C658E344

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 740 22e660f4fb0-22e660f4ff9 741 22e660f50aa-22e660f50af 740->741 742 22e660f4fff-22e660f503a call 22e65fc67ec 740->742 743 22e660f50b5-22e660f50f2 call 22e65fc67ec 741->743 744 22e660f5162-22e660f5179 741->744 752 22e660f503c-22e660f504d call 22e65fc68ec 742->752 753 22e660f504e-22e660f5057 742->753 757 22e660f5106-22e660f510f 743->757 758 22e660f50f4-22e660f5105 call 22e65fc68ec 743->758 747 22e660f5181-22e660f51c5 select 744->747 750 22e660f567c-22e660f56c0 WSAGetLastError call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 747->750 751 22e660f51cb-22e660f51cd 747->751 831 22e660f56d2-22e660f56db 750->831 832 22e660f56c2-22e660f56d1 call 22e65fc68ec 750->832 759 22e660f5568-22e660f55a4 WSAGetLastError call 22e660f48e0 call 22e65fcf290 751->759 760 22e660f51d3-22e660f51e6 __WSAFDIsSet 751->760 752->753 755 22e660f505d-22e660f506b 753->755 756 22e660f5794 753->756 767 22e660f5071-22e660f5074 755->767 768 22e660f578f call 22e65fede60 755->768 769 22e660f5796-22e660f57b8 call 22e660f3ae0 756->769 757->756 771 22e660f5115-22e660f5123 757->771 758->757 823 22e660f55b6-22e660f55bf 759->823 824 22e660f55a6-22e660f55b5 call 22e65fc68ec 759->824 762 22e660f51ec-22e660f51fe __WSAFDIsSet 760->762 763 22e660f5499-22e660f54ff getsockopt call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 760->763 772 22e660f5407-22e660f546d getsockopt call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 762->772 773 22e660f5204-22e660f521e recv 762->773 861 22e660f5511-22e660f551a 763->861 862 22e660f5501-22e660f5510 call 22e65fc68ec 763->862 778 22e660f507c-22e660f5083 767->778 779 22e660f5076-22e660f507b call 22e66115fb8 767->779 768->756 771->768 782 22e660f5129-22e660f512c 771->782 887 22e660f547f-22e660f5494 call 22e65fc65bc * 2 772->887 888 22e660f546f-22e660f547e call 22e65fc68ec 772->888 784 22e660f5256 773->784 785 22e660f5220-22e660f5223 773->785 791 22e660f508b-22e660f5092 778->791 792 22e660f5085-22e660f508a call 22e66115fb8 778->792 779->778 793 22e660f5134-22e660f513b 782->793 794 22e660f512e-22e660f5133 call 22e66115fb8 782->794 804 22e660f532c-22e660f5348 call 22e660f4c80 WSAGetLastError 784->804 805 22e660f525c-22e660f525f 784->805 798 22e660f5225-22e660f522d WSAGetLastError 785->798 799 22e660f5231-22e660f5237 785->799 807 22e660f509a-22e660f509e 791->807 808 22e660f5094-22e660f5099 call 22e66115fb8 791->808 792->791 795 22e660f513d-22e660f5142 call 22e66115fb8 793->795 796 22e660f5143-22e660f514a 793->796 794->793 795->796 812 22e660f514c-22e660f5151 call 22e66115fb8 796->812 813 22e660f5152-22e660f5156 796->813 798->799 820 22e660f527b-22e660f527e call 22e660f4c80 799->820 821 22e660f5239-22e660f523c 799->821 853 22e660f534a-22e660f534c 804->853 854 22e660f539f-22e660f53d1 call 22e660f48e0 call 22e65fcf290 804->854 825 22e660f53f8-22e660f5402 805->825 826 22e660f5265-22e660f5268 805->826 817 22e660f578c 807->817 818 22e660f50a4-22e660f50a9 call 22e66115fb8 807->818 808->807 812->813 813->817 833 22e660f515c-22e660f5161 call 22e66115fb8 813->833 817->768 818->741 858 22e660f5283-22e660f5296 820->858 821->820 837 22e660f523e-22e660f5251 Sleep 821->837 840 22e660f55c1-22e660f55cf 823->840 841 22e660f560e-22e660f5629 823->841 824->823 825->769 826->769 842 22e660f526e-22e660f5276 826->842 848 22e660f56dd-22e660f56eb 831->848 849 22e660f572a-22e660f5745 831->849 832->831 833->744 837->747 856 22e660f5609 call 22e65fede60 840->856 857 22e660f55d1-22e660f55d4 840->857 841->756 850 22e660f562f-22e660f563d 841->850 842->747 865 22e660f56ed-22e660f56f0 848->865 866 22e660f5725 call 22e65fede60 848->866 849->756 859 22e660f5747-22e660f5755 849->859 850->768 868 22e660f5643-22e660f5646 850->868 853->854 870 22e660f534e-22e660f5380 call 22e660f48e0 call 22e65fcf290 853->870 940 22e660f53e3-22e660f53ed call 22e65fc65bc 854->940 941 22e660f53d3-22e660f53e2 call 22e65fc68ec 854->941 856->841 871 22e660f55dc-22e660f55e3 857->871 872 22e660f55d6-22e660f55db call 22e66115fb8 857->872 873 22e660f5298-22e660f52c0 call 22e660f48e0 call 22e65fcf290 858->873 874 22e660f52e2-22e660f530a call 22e660f48e0 call 22e65fcf290 858->874 859->768 877 22e660f5757-22e660f575a 859->877 881 22e660f551c-22e660f552a call 22e65fc615c 861->881 882 22e660f552f-22e660f554a 861->882 862->861 883 22e660f56f8-22e660f56ff 865->883 884 22e660f56f2-22e660f56f7 call 22e66115fb8 865->884 866->849 885 22e660f5648-22e660f564d call 22e66115fb8 868->885 886 22e660f564e-22e660f5655 868->886 969 22e660f5392-22e660f539d call 22e65fc65bc 870->969 970 22e660f5382-22e660f5391 call 22e65fc68ec 870->970 875 22e660f55eb-22e660f55f2 871->875 876 22e660f55e5-22e660f55ea call 22e66115fb8 871->876 872->871 956 22e660f52d2-22e660f52dd call 22e65fc65bc 873->956 957 22e660f52c2-22e660f52d1 call 22e65fc68ec 873->957 964 22e660f531c-22e660f5327 call 22e65fc65bc 874->964 965 22e660f530c-22e660f531b call 22e65fc68ec 874->965 897 22e660f55fa-22e660f55fe 875->897 898 22e660f55f4-22e660f55f9 call 22e66115fb8 875->898 876->875 895 22e660f575c-22e660f5761 call 22e66115fb8 877->895 896 22e660f5762-22e660f5769 877->896 881->882 882->756 903 22e660f5550-22e660f5563 call 22e65fc615c 882->903 905 22e660f5707-22e660f570e 883->905 906 22e660f5701-22e660f5706 call 22e66115fb8 883->906 884->883 885->886 908 22e660f565d-22e660f5664 886->908 909 22e660f5657-22e660f565c call 22e66115fb8 886->909 887->756 888->887 895->896 918 22e660f576b-22e660f5770 call 22e66115fb8 896->918 919 22e660f5771-22e660f5778 896->919 921 22e660f5606 897->921 922 22e660f5600-22e660f5605 call 22e66115fb8 897->922 898->897 903->756 928 22e660f5716-22e660f571a 905->928 929 22e660f5710-22e660f5715 call 22e66115fb8 905->929 906->905 931 22e660f566c-22e660f5670 908->931 932 22e660f5666-22e660f566b call 22e66115fb8 908->932 909->908 918->919 943 22e660f577a-22e660f577f call 22e66115fb8 919->943 944 22e660f5780-22e660f5784 919->944 921->856 922->921 950 22e660f571c-22e660f5721 call 22e66115fb8 928->950 951 22e660f5722 928->951 929->928 931->817 954 22e660f5676-22e660f567b call 22e66115fb8 931->954 932->931 988 22e660f53ee-22e660f53f3 call 22e65fc65bc 940->988 941->940 943->944 944->817 963 22e660f5786-22e660f578b call 22e66115fb8 944->963 950->951 951->866 954->750 956->988 957->956 963->817 964->988 965->964 969->988 970->969 988->825
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$Deallocategetsockoptstd::_$Ios_base_dtorSleepclosesocketrecvselectstd::ios_base::_
                                                        • String ID: (Connector::DoRecv) Fd is not set read : wsaerror=$(Connector::DoRecv) Fd is set exception: wsaerror=$(Connector::DoRecv) Input parameters incorrect$(Connector::DoRecv) No connection$(Connector::DoRecv) Nothing was recv - connection aborted : wsaerror=$(Connector::DoRecv) Nothing was recv : wsaerror=$(Connector::DoRecv) Recv buffer failed - connection aborted : wsaerror=$(Connector::DoRecv) Recv buffer failed : wsaerror=$(Connector::DoRecv) Select timeout failed : wsaerror=$(Connector::DoRecv) timeout for recv is out : wsaerror=
                                                        • API String ID: 1722691136-3325305776
                                                        • Opcode ID: 3a1f28025f96cbf383587fb27e3240c4daede2229cf8c7aa9ac79cd90a61f0b3
                                                        • Instruction ID: ddc1b3e7854863537ac0a45d2795e15aa5335668e1939c6b010b61511234ed4a
                                                        • Opcode Fuzzy Hash: 3a1f28025f96cbf383587fb27e3240c4daede2229cf8c7aa9ac79cd90a61f0b3
                                                        • Instruction Fuzzy Hash: FC2228B6625641B6EE90EBE5D04C3BFB368F7B1360F516621AA6D03AD6DB7CC440DB00

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1287 22e660f57c0-22e660f5809 1288 22e660f58ba-22e660f58bf 1287->1288 1289 22e660f580f-22e660f584a call 22e65fc67ec 1287->1289 1291 22e660f58c5-22e660f5902 call 22e65fc67ec 1288->1291 1292 22e660f5972-22e660f597c 1288->1292 1296 22e660f584c-22e660f585d call 22e65fc68ec 1289->1296 1297 22e660f585e-22e660f5867 1289->1297 1307 22e660f5916-22e660f591f 1291->1307 1308 22e660f5904-22e660f5915 call 22e65fc68ec 1291->1308 1294 22e660f5980-22e660f59bd select 1292->1294 1298 22e660f59c3-22e660f59c5 1294->1298 1299 22e660f5d62-22e660f5da6 WSAGetLastError call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 1294->1299 1296->1297 1304 22e660f586d-22e660f587b 1297->1304 1305 22e660f5e7a 1297->1305 1302 22e660f59cb-22e660f59de __WSAFDIsSet 1298->1302 1303 22e660f5c4e-22e660f5c8a WSAGetLastError call 22e660f48e0 call 22e65fcf290 1298->1303 1382 22e660f5db8-22e660f5dc1 1299->1382 1383 22e660f5da8-22e660f5db7 call 22e65fc68ec 1299->1383 1311 22e660f5b84-22e660f5beb getsockopt call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 1302->1311 1312 22e660f59e4-22e660f59f6 __WSAFDIsSet 1302->1312 1362 22e660f5c9c-22e660f5ca5 1303->1362 1363 22e660f5c8c-22e660f5c9b call 22e65fc68ec 1303->1363 1313 22e660f5e75 call 22e65fede60 1304->1313 1314 22e660f5881-22e660f5884 1304->1314 1317 22e660f5e7c-22e660f5e9c call 22e660f3ae0 1305->1317 1307->1305 1309 22e660f5925-22e660f5933 1307->1309 1308->1307 1309->1313 1319 22e660f5939-22e660f593c 1309->1319 1410 22e660f5bfd-22e660f5c06 1311->1410 1411 22e660f5bed-22e660f5bfc call 22e65fc68ec 1311->1411 1320 22e660f59fc-22e660f5a13 send 1312->1320 1321 22e660f5af1-22e660f5b58 getsockopt call 22e660f4c80 call 22e660f48e0 call 22e65fcf290 1312->1321 1313->1305 1323 22e660f588c-22e660f5893 1314->1323 1324 22e660f5886-22e660f588b call 22e66115fb8 1314->1324 1330 22e660f5944-22e660f594b 1319->1330 1331 22e660f593e-22e660f5943 call 22e66115fb8 1319->1331 1332 22e660f5a15-22e660f5a17 1320->1332 1333 22e660f5a22-22e660f5a25 1320->1333 1418 22e660f5b6a-22e660f5b7f call 22e65fc65bc * 2 1321->1418 1419 22e660f5b5a-22e660f5b69 call 22e65fc68ec 1321->1419 1339 22e660f589b-22e660f58a2 1323->1339 1340 22e660f5895-22e660f589a call 22e66115fb8 1323->1340 1324->1323 1345 22e660f594d-22e660f5952 call 22e66115fb8 1330->1345 1346 22e660f5953-22e660f595a 1330->1346 1331->1330 1347 22e660f5a1d 1332->1347 1348 22e660f5ae9-22e660f5aec 1332->1348 1349 22e660f5a27-22e660f5a2f WSAGetLastError 1333->1349 1350 22e660f5a33-22e660f5a36 call 22e660f4c80 1333->1350 1342 22e660f58aa-22e660f58ae 1339->1342 1343 22e660f58a4-22e660f58a9 call 22e66115fb8 1339->1343 1340->1339 1358 22e660f58b4-22e660f58b9 call 22e66115fb8 1342->1358 1359 22e660f5e72 1342->1359 1343->1342 1345->1346 1366 22e660f595c-22e660f5961 call 22e66115fb8 1346->1366 1367 22e660f5962-22e660f5966 1346->1367 1347->1294 1348->1317 1349->1350 1374 22e660f5a3b-22e660f5a4e 1350->1374 1358->1288 1359->1313 1376 22e660f5ca7-22e660f5cb5 1362->1376 1377 22e660f5cf4-22e660f5d0f 1362->1377 1363->1362 1366->1367 1367->1359 1381 22e660f596c-22e660f5971 call 22e66115fb8 1367->1381 1389 22e660f5a97-22e660f5abf call 22e660f48e0 call 22e65fcf290 1374->1389 1390 22e660f5a50-22e660f5a78 call 22e660f48e0 call 22e65fcf290 1374->1390 1392 22e660f5cb7-22e660f5cba 1376->1392 1393 22e660f5cef call 22e65fede60 1376->1393 1377->1305 1386 22e660f5d15-22e660f5d23 1377->1386 1381->1292 1384 22e660f5dc3-22e660f5dd1 1382->1384 1385 22e660f5e10-22e660f5e2b 1382->1385 1383->1382 1400 22e660f5e0b call 22e65fede60 1384->1400 1401 22e660f5dd3-22e660f5dd6 1384->1401 1385->1305 1408 22e660f5e2d-22e660f5e3b 1385->1408 1386->1313 1403 22e660f5d29-22e660f5d2c 1386->1403 1484 22e660f5ad1-22e660f5adb call 22e65fc65bc 1389->1484 1485 22e660f5ac1-22e660f5ad0 call 22e65fc68ec 1389->1485 1477 22e660f5a8a-22e660f5a95 call 22e65fc65bc 1390->1477 1478 22e660f5a7a-22e660f5a89 call 22e65fc68ec 1390->1478 1406 22e660f5cbc-22e660f5cc1 call 22e66115fb8 1392->1406 1407 22e660f5cc2-22e660f5cc9 1392->1407 1393->1377 1400->1385 1414 22e660f5dd8-22e660f5ddd call 22e66115fb8 1401->1414 1415 22e660f5dde-22e660f5de5 1401->1415 1416 22e660f5d34-22e660f5d3b 1403->1416 1417 22e660f5d2e-22e660f5d33 call 22e66115fb8 1403->1417 1406->1407 1423 22e660f5ccb-22e660f5cd0 call 22e66115fb8 1407->1423 1424 22e660f5cd1-22e660f5cd8 1407->1424 1408->1313 1425 22e660f5e3d-22e660f5e40 1408->1425 1412 22e660f5c18-22e660f5c33 1410->1412 1413 22e660f5c08-22e660f5c13 call 22e65fc615c 1410->1413 1411->1410 1412->1305 1430 22e660f5c39-22e660f5c49 call 22e65fc615c 1412->1430 1413->1412 1414->1415 1432 22e660f5ded-22e660f5df4 1415->1432 1433 22e660f5de7-22e660f5dec call 22e66115fb8 1415->1433 1435 22e660f5d3d-22e660f5d42 call 22e66115fb8 1416->1435 1436 22e660f5d43-22e660f5d4a 1416->1436 1417->1416 1418->1305 1419->1418 1423->1424 1444 22e660f5cda-22e660f5cdf call 22e66115fb8 1424->1444 1445 22e660f5ce0-22e660f5ce4 1424->1445 1442 22e660f5e48-22e660f5e4f 1425->1442 1443 22e660f5e42-22e660f5e47 call 22e66115fb8 1425->1443 1430->1305 1451 22e660f5dfc-22e660f5e00 1432->1451 1452 22e660f5df6-22e660f5dfb call 22e66115fb8 1432->1452 1433->1432 1435->1436 1454 22e660f5d4c-22e660f5d51 call 22e66115fb8 1436->1454 1455 22e660f5d52-22e660f5d56 1436->1455 1462 22e660f5e57-22e660f5e5e 1442->1462 1463 22e660f5e51-22e660f5e56 call 22e66115fb8 1442->1463 1443->1442 1444->1445 1465 22e660f5cec 1445->1465 1466 22e660f5ce6-22e660f5ceb call 22e66115fb8 1445->1466 1474 22e660f5e08 1451->1474 1475 22e660f5e02-22e660f5e07 call 22e66115fb8 1451->1475 1452->1451 1454->1455 1455->1359 1479 22e660f5d5c-22e660f5d61 call 22e66115fb8 1455->1479 1468 22e660f5e66-22e660f5e6a 1462->1468 1469 22e660f5e60-22e660f5e65 call 22e66115fb8 1462->1469 1463->1462 1465->1393 1466->1465 1468->1359 1489 22e660f5e6c-22e660f5e71 call 22e66115fb8 1468->1489 1469->1468 1474->1400 1475->1474 1507 22e660f5adc-22e660f5ae6 call 22e65fc65bc 1477->1507 1478->1477 1479->1299 1484->1507 1485->1484 1489->1359 1507->1348
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$Deallocategetsockoptstd::_$Ios_base_dtorclosesocketselectsendstd::ios_base::_
                                                        • String ID: (Connector::DoSend) Fd is not set write : wsaerror=$(Connector::DoSend) Fd is set exception : wsaerror=$(Connector::DoSend) Input parameters incorrect$(Connector::DoSend) No connection$(Connector::DoSend) Select timeout failed : wsaerror=$(Connector::DoSend) Send buffer failed - connection aborted: wsaerror=$(Connector::DoSend) Send buffer failed : wsaerror=$(Connector::DoSend) timeout for send is out : wsaerror=
                                                        • API String ID: 3764467191-4057505521
                                                        • Opcode ID: 2ec3235494c439a7a7e183fab81296308f71a776a6456c200898e8a14cfcd507
                                                        • Instruction ID: e11d335ed3268b060ee11fc7a61fb4358e55446fa8ba8bd271891b7e2a2129f0
                                                        • Opcode Fuzzy Hash: 2ec3235494c439a7a7e183fab81296308f71a776a6456c200898e8a14cfcd507
                                                        • Instruction Fuzzy Hash: A70215B2225641A5EE54EBE5D00C3BFB368E7B13A0F516621EA6D03ADADF3CC441E700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$ConvertFree_com_issue_error_com_util::$AddressBlanketCreateHandleInitInstanceModuleProcProxyVariant
                                                        • String ID: CoSetProxyBlanket$ROOT\CIMV2$WQL$ole32.dll
                                                        • API String ID: 3840990785-3464224570
                                                        • Opcode ID: f49ba43b31519e4b9e192c40a87efcc49914ee7b2c56dc2095fb8d1a338636ee
                                                        • Instruction ID: 061c1be98a338b8c9d448450bf07b18f0c6ab4f61bce27df45cdec0493f8abed
                                                        • Opcode Fuzzy Hash: f49ba43b31519e4b9e192c40a87efcc49914ee7b2c56dc2095fb8d1a338636ee
                                                        • Instruction Fuzzy Hash: 04329DB6701B44A9EF14EBA6E44C7BE77A9E7A0B98F111414DB5D03F99CF78C884A310

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3540 22e65feaa68-22e65feaab6 call 22e65fd1d14 RpcServerUseProtseqEpA 3543 22e65feaab8-22e65feaabd 3540->3543 3544 22e65feaabf-22e65feaae9 RpcServerRegisterIfEx 3540->3544 3543->3544 3545 22e65feab01 3543->3545 3544->3545 3546 22e65feaaeb-22e65feaafb RpcServerListen 3544->3546 3548 22e65feab03-22e65feab0c 3545->3548 3546->3545 3547 22e65feaafd-22e65feaaff 3546->3547 3547->3548 3549 22e65feab21-22e65feab3c 3548->3549 3550 22e65feab0e-22e65feab1c call 22e65fc615c 3548->3550 3550->3549
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Server$DeallocateListenProtseqRegisterstd::_
                                                        • String ID: \pipe\$ncacn_np
                                                        • API String ID: 2934073445-1932380190
                                                        • Opcode ID: fb2b95c63c9c70d6f851d05490d9daadbe530feb8ea969676a715748920a882c
                                                        • Instruction ID: 05f0897988542b7033f14c813422b670a14874d989a88520379b1350fe34d134
                                                        • Opcode Fuzzy Hash: fb2b95c63c9c70d6f851d05490d9daadbe530feb8ea969676a715748920a882c
                                                        • Instruction Fuzzy Hash: 35215761324580A5FF108FA1E48C7AA73AAF3F0390F511126E6AA43AE5DF2CC445DB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171229611.0000022E65CA6000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022E65CA6000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65ca6000_rundll32.jbxd
                                                        Similarity
                                                        • API ID: ProtectSectionVirtual$CreateView
                                                        • String ID: @$@
                                                        • API String ID: 3127889780-149943524
                                                        • Opcode ID: ec024777d0c7faa6f64b737617b3c1eca50247ef54ff4b2481412eee8cd88577
                                                        • Instruction ID: 45f8a880c69601807e5d717c8417f39ae96a22edb4fad2f6b938ec697dca8c6b
                                                        • Opcode Fuzzy Hash: ec024777d0c7faa6f64b737617b3c1eca50247ef54ff4b2481412eee8cd88577
                                                        • Instruction Fuzzy Hash: 0E02FE30208B498FDBA4DF58C458BAAB7E1FBA8311F51492DE58DC73A0DB75D884CB42
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171229611.0000022E65CA6000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022E65CA6000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65ca6000_rundll32.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual$CreateSection
                                                        • String ID:
                                                        • API String ID: 3928134249-0
                                                        • Opcode ID: 01aea7d5306dfd5fb0f08ae7a7d208078b26442dadfb8409917864f98d92bf90
                                                        • Instruction ID: 369fb6a772347608f344576f4a6eb07fab94eeba255e12c311ccd2be2446897b
                                                        • Opcode Fuzzy Hash: 01aea7d5306dfd5fb0f08ae7a7d208078b26442dadfb8409917864f98d92bf90
                                                        • Instruction Fuzzy Hash: A6311030618B888FD754DB2CC859B6A7BE5FBA9311F00462EE599C33E0DB75D940CB42
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171229611.0000022E65CA6000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022E65CA6000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65ca6000_rundll32.jbxd
                                                        Similarity
                                                        • API ID: FileOpen
                                                        • String ID:
                                                        • API String ID: 2669468079-0
                                                        • Opcode ID: 2fba1f18ae9891822a26905f9bce1b2c4df6e157ef82356e139a9b7859376684
                                                        • Instruction ID: 10da5df136d600097953c46febe01169cd242f963fcd5b5fb364a41a466ee0ab
                                                        • Opcode Fuzzy Hash: 2fba1f18ae9891822a26905f9bce1b2c4df6e157ef82356e139a9b7859376684
                                                        • Instruction Fuzzy Hash: E021FB30618B449FE744EF68C859B6ABBE5FBA8760F440A2EF495C33E0D664D840CB42

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 994 22e65fd5530-22e65fd557b call 22e65fc9768 call 22e65fd1d14 call 22e65fc98a0 1001 22e65fd557d-22e65fd5587 call 22e65fc615c 994->1001 1002 22e65fd558c-22e65fd5a12 call 22e65ff0980 call 22e65fc68ec call 22e65fc6718 call 22e65fd1978 call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec 994->1002 1001->1002 1052 22e65fd5a16-22e65fd5a1d 1002->1052 1052->1052 1053 22e65fd5a1f-22e65fd5ac9 call 22e65fc67ec call 22e65fc68ec * 2 call 22e65fd002c call 22e65fd114c call 22e65fd1158 call 22e65fd1220 1052->1053 1068 22e65fd5ad0-22e65fd5adb call 22e65fd1a6c call 22e65fd1c8c 1053->1068 1072 22e65fd5ae0-22e65fd5af2 call 22e65fd039c 1068->1072 1074 22e65fd5af7-22e65fd5af9 1072->1074 1075 22e65fd5afb-22e65fd5b02 1074->1075 1076 22e65fd5b04-22e65fd5ebe call 22e65fd0e8c call 22e65fd0f18 call 22e65fd044c call 22e65fd1a6c call 22e65fd1c8c call 22e65fe6e04 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd0fc0 1074->1076 1075->1068 1111 22e65fd5f02-22e65fd6135 call 22e65fd100c call 22e65fd1a6c call 22e65fd1c8c call 22e65fed7b4 call 22e65fc8558 call 22e65fd1a6c call 22e65fd1884 call 22e65fd0f6c call 22e65fe6738 call 22e65fc65bc call 22e65fd0fc0 1076->1111 1112 22e65fd5ec0-22e65fd5ee0 call 22e65fd1a6c call 22e65fd1c8c 1076->1112 1170 22e65fd613b-22e65fd613f 1111->1170 1171 22e65fd640c-22e65fd643b call 22e65fc65bc * 2 call 22e65fd32a0 call 22e65fc65bc * 2 1111->1171 1123 22e65fd5ee2-22e65fd5eec call 22e65fc615c 1112->1123 1124 22e65fd5ef1-22e65fd5efd 1112->1124 1123->1124 1127 22e65fd6440-22e65fd644f call 22e65fd1128 1124->1127 1133 22e65fd646c-22e65fd65a7 call 22e65feab40 call 22e65ff07f0 call 22e65fd01b0 call 22e65fc65bc * 3 call 22e65fcfb70 call 22e65fc65bc * 2 call 22e65fd67e0 call 22e65fc65bc * 9 call 22e65fd1810 * 2 call 22e65fc65bc * 3 1127->1133 1134 22e65fd6451-22e65fd6454 1127->1134 1134->1072 1137 22e65fd645a-22e65fd6467 call 22e65fed970 1134->1137 1137->1072 1173 22e65fd6194-22e65fd61c6 call 22e65fd1a6c call 22e65fd1884 call 22e65fd68b8 call 22e65fd100c 1170->1173 1174 22e65fd6141-22e65fd615f 1170->1174 1171->1127 1173->1171 1202 22e65fd61cc-22e65fd621a call 22e65fd1a6c call 22e65fd1884 call 22e65fc6680 * 2 call 22e65fed3cc 1173->1202 1174->1173 1179 22e65fd6166 call 22e65fe7140 1174->1179 1179->1173 1224 22e65fd621c-22e65fd623f call 22e65fd1a6c call 22e65fd1884 call 22e65fd10f8 1202->1224 1225 22e65fd6244-22e65fd6269 call 22e65fd1164 call 22e65fd3808 1202->1225 1241 22e65fd63f2-22e65fd640b call 22e65fc65bc * 2 1224->1241 1225->1241 1242 22e65fd626f-22e65fd62a4 call 22e65fd12a4 call 22e65fd1298 call 22e65fd1280 1225->1242 1241->1171 1242->1241 1261 22e65fd62aa-22e65fd6385 call 22e65fd1294 call 22e65fc63a4 call 22e65fd0f6c call 22e65fd4f0c call 22e65fc65bc call 22e65fd136c 1242->1261 1275 22e65fd6387-22e65fd63b4 call 22e65fd6698 1261->1275 1276 22e65fd63b8-22e65fd63e5 call 22e65fc65bc call 22e65fd668c call 22e65fd1280 1261->1276 1275->1276 1276->1261 1286 22e65fd63eb 1276->1286 1286->1241
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Domain name: $Failed DoHandshake$Starting connection loop$User name: $dex$dij$gdt$ins$kSevFxr92Wwmuht3RfZcQHYiz4pj087CNKdlaL5D$plg$sdl$shi
                                                        • API String ID: 1323251999-3495704378
                                                        • Opcode ID: 12a4600ac29fc29ee7c5ab9b27aa1996ada06b6f5febe6fb2fc552a88155e351
                                                        • Instruction ID: fa458c24e9d3f01cb439b2781b3a7a3706bc4f1ce13922503ce7f3b920f12b71
                                                        • Opcode Fuzzy Hash: 12a4600ac29fc29ee7c5ab9b27aa1996ada06b6f5febe6fb2fc552a88155e351
                                                        • Instruction Fuzzy Hash: FFF13A76B10B90A8EB10DBB5ED442EE37B9F76138CF414115DF496BAAADF308619E304

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2145 22e65fd50df-22e65fd5129 call 22e65fc68ec 2148 22e65fd512b-22e65fd512e 2145->2148 2149 22e65fd5130 2145->2149 2151 22e65fd513c-22e65fd5186 call 22e65fc67ec call 22e65fc6e78 2148->2151 2150 22e65fd5133-22e65fd513a 2149->2150 2150->2150 2150->2151 2156 22e65fd518d 2151->2156 2157 22e65fd5188-22e65fd518b 2151->2157 2159 22e65fd5190-22e65fd5197 2156->2159 2158 22e65fd5199-22e65fd51c8 call 22e65fc67ec 2157->2158 2162 22e65fd51ca-22e65fd51cd 2158->2162 2163 22e65fd51cf 2158->2163 2159->2158 2159->2159 2164 22e65fd51db-22e65fd520a call 22e65fc67ec 2162->2164 2165 22e65fd51d2-22e65fd51d9 2163->2165 2168 22e65fd520c-22e65fd520f 2164->2168 2169 22e65fd5211 2164->2169 2165->2164 2165->2165 2171 22e65fd521d-22e65fd524c call 22e65fc67ec call 22e65fd3814 2168->2171 2170 22e65fd5214-22e65fd521b 2169->2170 2170->2170 2170->2171 2176 22e65fd525d-22e65fd5270 2171->2176 2177 22e65fd524e-22e65fd5258 call 22e65fc615c 2171->2177 2179 22e65fd5272-22e65fd527c call 22e65fc615c 2176->2179 2180 22e65fd5281-22e65fd52d2 call 22e661188b0 * 2 2176->2180 2177->2176 2179->2180 2186 22e65fd52d9 2180->2186 2187 22e65fd52d4-22e65fd52d7 2180->2187 2188 22e65fd52dc-22e65fd52e3 2186->2188 2189 22e65fd52e5-22e65fd5311 call 22e65fc67ec 2187->2189 2188->2188 2188->2189 2192 22e65fd5318 2189->2192 2193 22e65fd5313-22e65fd5316 2189->2193 2195 22e65fd531b-22e65fd5322 2192->2195 2194 22e65fd5324-22e65fd5363 call 22e65fc67ec call 22e65fd3a70 2193->2194 2200 22e65fd5365-22e65fd536f call 22e65fc615c 2194->2200 2201 22e65fd5374-22e65fd538c 2194->2201 2195->2194 2195->2195 2200->2201 2203 22e65fd539d-22e65fd54a2 call 22e65fc6ecc CoInitializeEx CoInitializeSecurity call 22e65fd3f84 call 22e65ff0b00 call 22e65ff0800 call 22e65fd68cc call 22e66114a00 call 22e65fc17c0 * 2 call 22e65fc1810 call 22e65fc37f0 call 22e65fc1640 call 22e65fc1000 2201->2203 2204 22e65fd538e-22e65fd5398 call 22e65fc615c 2201->2204 2230 22e65fd54a4-22e65fd54aa CoUninitialize 2203->2230 2231 22e65fd54af-22e65fd5a12 call 22e661174c8 call 22e65fd6870 * 2 call 22e65ff0c80 call 22e65ff0980 call 22e65fc68ec call 22e65fc6718 call 22e65fd1978 call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec call 22e65fd673c call 22e65fc67ec 2203->2231 2204->2203 2232 22e65fd651a-22e65fd65a7 call 22e65fc65bc * 4 call 22e65fd1810 * 2 call 22e65fc65bc * 3 2230->2232 2307 22e65fd5a16-22e65fd5a1d 2231->2307 2307->2307 2308 22e65fd5a1f-22e65fd5ac9 call 22e65fc67ec call 22e65fc68ec * 2 call 22e65fd002c call 22e65fd114c call 22e65fd1158 call 22e65fd1220 2307->2308 2323 22e65fd5ad0-22e65fd5adb call 22e65fd1a6c call 22e65fd1c8c 2308->2323 2327 22e65fd5ae0-22e65fd5af2 call 22e65fd039c 2323->2327 2329 22e65fd5af7-22e65fd5af9 2327->2329 2330 22e65fd5afb-22e65fd5b02 2329->2330 2331 22e65fd5b04-22e65fd5ebe call 22e65fd0e8c call 22e65fd0f18 call 22e65fd044c call 22e65fd1a6c call 22e65fd1c8c call 22e65fe6e04 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd0fc0 2329->2331 2330->2323 2366 22e65fd5f02-22e65fd6135 call 22e65fd100c call 22e65fd1a6c call 22e65fd1c8c call 22e65fed7b4 call 22e65fc8558 call 22e65fd1a6c call 22e65fd1884 call 22e65fd0f6c call 22e65fe6738 call 22e65fc65bc call 22e65fd0fc0 2331->2366 2367 22e65fd5ec0-22e65fd5ee0 call 22e65fd1a6c call 22e65fd1c8c 2331->2367 2425 22e65fd613b-22e65fd613f 2366->2425 2426 22e65fd640c-22e65fd643b call 22e65fc65bc * 2 call 22e65fd32a0 call 22e65fc65bc * 2 2366->2426 2378 22e65fd5ee2-22e65fd5eec call 22e65fc615c 2367->2378 2379 22e65fd5ef1-22e65fd5efd 2367->2379 2378->2379 2382 22e65fd6440-22e65fd644f call 22e65fd1128 2379->2382 2388 22e65fd646c-22e65fd6519 call 22e65feab40 call 22e65ff07f0 call 22e65fd01b0 call 22e65fc65bc * 3 call 22e65fcfb70 call 22e65fc65bc * 2 call 22e65fd67e0 call 22e65fc65bc * 5 2382->2388 2389 22e65fd6451-22e65fd6454 2382->2389 2388->2232 2389->2327 2392 22e65fd645a-22e65fd6467 call 22e65fed970 2389->2392 2392->2327 2428 22e65fd6194-22e65fd61c6 call 22e65fd1a6c call 22e65fd1884 call 22e65fd68b8 call 22e65fd100c 2425->2428 2429 22e65fd6141-22e65fd615f 2425->2429 2426->2382 2428->2426 2457 22e65fd61cc-22e65fd621a call 22e65fd1a6c call 22e65fd1884 call 22e65fc6680 * 2 call 22e65fed3cc 2428->2457 2429->2428 2434 22e65fd6166 call 22e65fe7140 2429->2434 2434->2428 2473 22e65fd621c-22e65fd623f call 22e65fd1a6c call 22e65fd1884 call 22e65fd10f8 2457->2473 2474 22e65fd6244-22e65fd6269 call 22e65fd1164 call 22e65fd3808 2457->2474 2484 22e65fd63f2-22e65fd640b call 22e65fc65bc * 2 2473->2484 2474->2484 2485 22e65fd626f-22e65fd62a4 call 22e65fd12a4 call 22e65fd1298 call 22e65fd1280 2474->2485 2484->2426 2485->2484 2498 22e65fd62aa-22e65fd6385 call 22e65fd1294 call 22e65fc63a4 call 22e65fd0f6c call 22e65fd4f0c call 22e65fc65bc call 22e65fd136c 2485->2498 2511 22e65fd6387-22e65fd63b4 call 22e65fd6698 2498->2511 2512 22e65fd63b8-22e65fd63e5 call 22e65fc65bc call 22e65fd668c call 22e65fd1280 2498->2512 2511->2512 2512->2498 2522 22e65fd63eb 2512->2522 2522->2484
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$AddressProc$Initialize$HandleModuleSecurityUninitializesprintf
                                                        • String ID: .live$300$NEW_BLACK
                                                        • API String ID: 3648849760-3156522211
                                                        • Opcode ID: 6f87fa7bc04f22c233fbe0f5198bf22356ff43927f06dad47666d4623fe1245e
                                                        • Instruction ID: af301556ffb08faba63ceee35d89593a9c56a2174619d6b741c30cf4a44c8e02
                                                        • Opcode Fuzzy Hash: 6f87fa7bc04f22c233fbe0f5198bf22356ff43927f06dad47666d4623fe1245e
                                                        • Instruction Fuzzy Hash: 68C14B66710A80ADEB20DFB5EC883EE37A8F76134CF414115AB4957AAADF34C658E740

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2523 22e65fd0afc-22e65fd0b3c call 22e660f6080 2526 22e65fd0d6d-22e65fd0d8a 2523->2526 2527 22e65fd0b42-22e65fd0b4c call 22e660f60a0 2523->2527 2527->2526 2530 22e65fd0b52-22e65fd0bbb call 22e65fd1d14 call 22e65fcf304 call 22e65fd2020 call 22e65fd1e04 call 22e65fd1c8c 2527->2530 2541 22e65fd0bbd-22e65fd0bc7 call 22e65fc615c 2530->2541 2542 22e65fd0bcc-22e65fd0be5 2530->2542 2541->2542 2544 22e65fd0be7-22e65fd0bf1 call 22e65fc615c 2542->2544 2545 22e65fd0bf6-22e65fd0c0f 2542->2545 2544->2545 2547 22e65fd0c11-22e65fd0c1b call 22e65fc615c 2545->2547 2548 22e65fd0c20-22e65fd0c45 call 22e660f7b20 2545->2548 2547->2548 2551 22e65fd0c4a-22e65fd0c4f 2548->2551 2552 22e65fd0d47-22e65fd0d68 call 22e65fd0e74 call 22e65fd1a6c call 22e65fd1c8c 2551->2552 2553 22e65fd0c55-22e65fd0c5e call 22e65fd10f8 2551->2553 2552->2526 2558 22e65fd0c64-22e65fd0c6e call 22e660f6090 2553->2558 2559 22e65fd0cee-22e65fd0d23 call 22e660f4c80 call 22e660f6030 call 22e65fd1e04 call 22e65fd1c8c 2553->2559 2568 22e65fd0c8c-22e65fd0cab call 22e65fd0e30 call 22e65fd0df0 2558->2568 2569 22e65fd0c70-22e65fd0c7a call 22e660f6070 2558->2569 2587 22e65fd0d25-22e65fd0d2f call 22e65fc615c 2559->2587 2588 22e65fd0d34-22e65fd0d45 2559->2588 2582 22e65fd0cda-22e65fd0ce9 call 22e65fd1a6c call 22e65fd1c8c 2568->2582 2583 22e65fd0cad 2568->2583 2569->2568 2577 22e65fd0c7c-22e65fd0c8a 2569->2577 2581 22e65fd0cb4-22e65fd0cd8 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd2460 2577->2581 2581->2559 2582->2559 2583->2581 2587->2588 2588->2526
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Block right now!$CheckConnection ok$Timeout counter hitted$Timeout counter not hitted$Verify
                                                        • API String ID: 1323251999-3710821220
                                                        • Opcode ID: 91e8ceffc9b5ed7996f33046182b56978acc7b1ec32f574a8bd01ef955a1e792
                                                        • Instruction ID: ce929241cc2b2192263eb3bc73969c87c72a53aaf6da2a627a75b2b20e00df8b
                                                        • Opcode Fuzzy Hash: 91e8ceffc9b5ed7996f33046182b56978acc7b1ec32f574a8bd01ef955a1e792
                                                        • Instruction Fuzzy Hash: 1D61A261714644A8FF00EBA2D4583FD3369E762BC8F425226AE091B7DBDF78C50AE344

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2843 22e65fd5d70-22e65fd5d98 call 22e65fcfc4c call 22e65fc84bc 2848 22e65fd5d9a-22e65fd5da7 call 22e65fc615c 2843->2848 2849 22e65fd5dac-22e65fd5dc8 2843->2849 2848->2849 2851 22e65fd5dce-22e65fd5dfd call 22e65fd0ee0 call 22e65fc84bc 2849->2851 2852 22e65fd5e80-22e65fd5ebe call 22e65fe6e04 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd0fc0 2849->2852 2861 22e65fd5dff-22e65fd5e0c call 22e65fc615c 2851->2861 2862 22e65fd5e11-22e65fd5e2d 2851->2862 2871 22e65fd5f02-22e65fd6135 call 22e65fd100c call 22e65fd1a6c call 22e65fd1c8c call 22e65fed7b4 call 22e65fc8558 call 22e65fd1a6c call 22e65fd1884 call 22e65fd0f6c call 22e65fe6738 call 22e65fc65bc call 22e65fd0fc0 2852->2871 2872 22e65fd5ec0-22e65fd5ee0 call 22e65fd1a6c call 22e65fd1c8c 2852->2872 2861->2862 2862->2852 2866 22e65fd5e2f-22e65fd5e57 call 22e65fcfeb4 call 22e65fc84bc 2862->2866 2877 22e65fd5e6b-22e65fd5e79 2866->2877 2878 22e65fd5e59-22e65fd5e66 call 22e65fc615c 2866->2878 2956 22e65fd613b-22e65fd613f 2871->2956 2957 22e65fd640c-22e65fd643b call 22e65fc65bc * 2 call 22e65fd32a0 call 22e65fc65bc * 2 2871->2957 2888 22e65fd5ee2-22e65fd5eec call 22e65fc615c 2872->2888 2889 22e65fd5ef1-22e65fd5efd 2872->2889 2877->2852 2878->2877 2888->2889 2892 22e65fd6440-22e65fd644f call 22e65fd1128 2889->2892 2898 22e65fd646c-22e65fd65a7 call 22e65feab40 call 22e65ff07f0 call 22e65fd01b0 call 22e65fc65bc * 3 call 22e65fcfb70 call 22e65fc65bc * 2 call 22e65fd67e0 call 22e65fc65bc * 9 call 22e65fd1810 * 2 call 22e65fc65bc * 3 2892->2898 2899 22e65fd6451-22e65fd6454 2892->2899 2902 22e65fd645a-22e65fd6467 call 22e65fed970 2899->2902 2903 22e65fd5ae0-22e65fd5af2 call 22e65fd039c 2899->2903 2902->2903 2909 22e65fd5af7-22e65fd5af9 2903->2909 2914 22e65fd5afb-22e65fd5b02 call 22e65fd1a6c call 22e65fd1c8c 2909->2914 2915 22e65fd5b04-22e65fd5d6a call 22e65fd0e8c call 22e65fd0f18 call 22e65fd044c call 22e65fd1a6c call 22e65fd1c8c 2909->2915 2914->2903 2915->2852 2960 22e65fd6194-22e65fd61c6 call 22e65fd1a6c call 22e65fd1884 call 22e65fd68b8 call 22e65fd100c 2956->2960 2961 22e65fd6141-22e65fd615f 2956->2961 2957->2892 2960->2957 2998 22e65fd61cc-22e65fd621a call 22e65fd1a6c call 22e65fd1884 call 22e65fc6680 * 2 call 22e65fed3cc 2960->2998 2961->2960 2967 22e65fd6166 call 22e65fe7140 2961->2967 2967->2960 3023 22e65fd621c-22e65fd623f call 22e65fd1a6c call 22e65fd1884 call 22e65fd10f8 2998->3023 3024 22e65fd6244-22e65fd6269 call 22e65fd1164 call 22e65fd3808 2998->3024 3040 22e65fd63f2-22e65fd640b call 22e65fc65bc * 2 3023->3040 3024->3040 3041 22e65fd626f-22e65fd62a4 call 22e65fd12a4 call 22e65fd1298 call 22e65fd1280 3024->3041 3040->2957 3041->3040 3060 22e65fd62aa-22e65fd6385 call 22e65fd1294 call 22e65fc63a4 call 22e65fd0f6c call 22e65fd4f0c call 22e65fc65bc call 22e65fd136c 3041->3060 3074 22e65fd6387-22e65fd63b4 call 22e65fd6698 3060->3074 3075 22e65fd63b8-22e65fd63e5 call 22e65fc65bc call 22e65fd668c call 22e65fd1280 3060->3075 3074->3075 3075->3060 3085 22e65fd63eb 3075->3085 3085->3040
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DeallocateInternetstd::_$CloseHandleOpen$FileRead
                                                        • String ID: !conContext.Send$Failed DoHandshake$generate_ping
                                                        • API String ID: 2270628339-1141015282
                                                        • Opcode ID: dcef12f0143716c6fcf328767c18fad9f3b693b580416f6716f8ddb31c685cc4
                                                        • Instruction ID: 0212112fde89ea44eb5e0567cc7e598565bfa79da75a2e5451ba64861f8bca76
                                                        • Opcode Fuzzy Hash: dcef12f0143716c6fcf328767c18fad9f3b693b580416f6716f8ddb31c685cc4
                                                        • Instruction Fuzzy Hash: 8E4130613116C0ACEF24EBB6DC583FE276DF762788F415216DB094BAABDF348644A344

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Connect : $Enter CheckDGA$Leave CheckDGA$Trying connect to
                                                        • API String ID: 1323251999-1993950784
                                                        • Opcode ID: 20f233c21c21cd5471f32e99e268932ec94fbb312d6a48a6e3812fb0dcc6ffaf
                                                        • Instruction ID: 6c18f4fe5d34d3db241e56d88990d2df95f1ef6889f9cf45ac923e038b30182a
                                                        • Opcode Fuzzy Hash: 20f233c21c21cd5471f32e99e268932ec94fbb312d6a48a6e3812fb0dcc6ffaf
                                                        • Instruction Fuzzy Hash: 4851C0A2710601A9FE04DBA6D4487FD2369FB62B94F025326DF2D0B6D6EF78C551A340

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3320 22e65fd5b1f-22e65fd5b22 3321 22e65fd5b27-22e65fd5ebe call 22e65fd0f18 call 22e65fd044c call 22e65fd1a6c call 22e65fd1c8c call 22e65fe6e04 call 22e65fd1a6c call 22e65fd1c8c call 22e65fd0fc0 3320->3321 3352 22e65fd5f02-22e65fd6135 call 22e65fd100c call 22e65fd1a6c call 22e65fd1c8c call 22e65fed7b4 call 22e65fc8558 call 22e65fd1a6c call 22e65fd1884 call 22e65fd0f6c call 22e65fe6738 call 22e65fc65bc call 22e65fd0fc0 3321->3352 3353 22e65fd5ec0-22e65fd5ee0 call 22e65fd1a6c call 22e65fd1c8c 3321->3353 3423 22e65fd613b-22e65fd613f 3352->3423 3424 22e65fd640c-22e65fd643b call 22e65fc65bc * 2 call 22e65fd32a0 call 22e65fc65bc * 2 3352->3424 3364 22e65fd5ee2-22e65fd5eec call 22e65fc615c 3353->3364 3365 22e65fd5ef1-22e65fd5efd 3353->3365 3364->3365 3368 22e65fd6440-22e65fd644f call 22e65fd1128 3365->3368 3374 22e65fd646c-22e65fd65a7 call 22e65feab40 call 22e65ff07f0 call 22e65fd01b0 call 22e65fc65bc * 3 call 22e65fcfb70 call 22e65fc65bc * 2 call 22e65fd67e0 call 22e65fc65bc * 9 call 22e65fd1810 * 2 call 22e65fc65bc * 3 3368->3374 3375 22e65fd6451-22e65fd6454 3368->3375 3378 22e65fd645a-22e65fd6467 call 22e65fed970 3375->3378 3379 22e65fd5ae0-22e65fd5af2 call 22e65fd039c 3375->3379 3378->3379 3385 22e65fd5af7-22e65fd5af9 3379->3385 3390 22e65fd5afb-22e65fd5b02 call 22e65fd1a6c call 22e65fd1c8c 3385->3390 3391 22e65fd5b04-22e65fd5b24 call 22e65fd0e8c 3385->3391 3390->3379 3391->3321 3426 22e65fd6194-22e65fd61c6 call 22e65fd1a6c call 22e65fd1884 call 22e65fd68b8 call 22e65fd100c 3423->3426 3427 22e65fd6141-22e65fd615f 3423->3427 3424->3368 3426->3424 3455 22e65fd61cc-22e65fd621a call 22e65fd1a6c call 22e65fd1884 call 22e65fc6680 * 2 call 22e65fed3cc 3426->3455 3427->3426 3432 22e65fd6166 call 22e65fe7140 3427->3432 3432->3426 3477 22e65fd621c-22e65fd623f call 22e65fd1a6c call 22e65fd1884 call 22e65fd10f8 3455->3477 3478 22e65fd6244-22e65fd6269 call 22e65fd1164 call 22e65fd3808 3455->3478 3494 22e65fd63f2-22e65fd640b call 22e65fc65bc * 2 3477->3494 3478->3494 3495 22e65fd626f-22e65fd62a4 call 22e65fd12a4 call 22e65fd1298 call 22e65fd1280 3478->3495 3494->3424 3495->3494 3514 22e65fd62aa-22e65fd6385 call 22e65fd1294 call 22e65fc63a4 call 22e65fd0f6c call 22e65fd4f0c call 22e65fc65bc call 22e65fd136c 3495->3514 3528 22e65fd6387-22e65fd63b4 call 22e65fd6698 3514->3528 3529 22e65fd63b8-22e65fd63e5 call 22e65fc65bc call 22e65fd668c call 22e65fd1280 3514->3529 3528->3529 3529->3514 3539 22e65fd63eb 3529->3539 3539->3494
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Connection still not trusted$Failed DoHandshake
                                                        • API String ID: 1323251999-1812421182
                                                        • Opcode ID: de3b16d71f3c64bbeb3a9a4d213765ac19685f7042b9c91e0232d157e2fc2636
                                                        • Instruction ID: 87a8b99860817db52b5e9aea77aa83939fd0581155dc556dcdbc68c8df5721b7
                                                        • Opcode Fuzzy Hash: de3b16d71f3c64bbeb3a9a4d213765ac19685f7042b9c91e0232d157e2fc2636
                                                        • Instruction Fuzzy Hash: CC61C491310AC4A9FF60EBA6DD8C3FD236DE762784F424211CB0D4B6AADF39C645A344

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3713 22e65fced00-22e65fced28 3714 22e65fced2a-22e65fced2c 3713->3714 3715 22e65fced2e-22e65fced3b 3713->3715 3716 22e65fced80-22e65fceda8 call 22e65fcee34 3714->3716 3717 22e65fced3d-22e65fced42 call 22e660f3f74 3715->3717 3718 22e65fced43-22e65fced51 3715->3718 3731 22e65fcedaa 3716->3731 3732 22e65fcee08-22e65fcee32 3716->3732 3717->3718 3721 22e65fced78 call 22e660f2eec 3718->3721 3722 22e65fced53-22e65fced5a 3718->3722 3730 22e65fced7d 3721->3730 3723 22e65fced5c-22e65fced61 call 22e660f3f74 3722->3723 3724 22e65fced62-22e65fced76 call 22e660f2eec 3722->3724 3723->3724 3724->3716 3730->3716 3735 22e65fcedea-22e65fceded 3731->3735 3736 22e65fcedac-22e65fcedb4 3735->3736 3737 22e65fcedef-22e65fcee03 call 22e65fc615c 3735->3737 3739 22e65fcedc7-22e65fcedd9 3736->3739 3740 22e65fcedb6-22e65fcedc2 call 22e65fc615c 3736->3740 3737->3732 3741 22e65fceddb-22e65fcedde 3739->3741 3742 22e65fcede0 3739->3742 3740->3739 3744 22e65fcede3-22e65fcede6 3741->3744 3742->3744 3744->3735
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskDeallocatestd::_
                                                        • String ID:
                                                        • API String ID: 4012121645-0
                                                        • Opcode ID: a5d8e2f53df483de64681540a5985e6c93cddb737d03efc1223fc0de7a8d95fc
                                                        • Instruction ID: 34b773da1ed31b5cbb48dfb42bb2987e78f0d737a3774fa9e667e944c16f15dc
                                                        • Opcode Fuzzy Hash: a5d8e2f53df483de64681540a5985e6c93cddb737d03efc1223fc0de7a8d95fc
                                                        • Instruction Fuzzy Hash: 6F31F062710B40A5EE21CBA6E84D36A6268F764BF0F178731DB7903BC9DF34C491A740
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc
                                                        • String ID:
                                                        • API String ID: 190572456-0
                                                        • Opcode ID: 5518f5723a9ae15c3b47f29bd54c226d4d22c6a755726b2ae6182f5791a5fc79
                                                        • Instruction ID: d5250356e2ad6e2884019a66c32c5fc4cb771a4e88561d282df8564135b1a74e
                                                        • Opcode Fuzzy Hash: 5518f5723a9ae15c3b47f29bd54c226d4d22c6a755726b2ae6182f5791a5fc79
                                                        • Instruction Fuzzy Hash: 5441C8E1B21640B2FE559B96A80C775639DB774FD0F0B85259F1D4B784EA3CC481A350
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 2067211477-0
                                                        • Opcode ID: 8499ebcfb489e6abf4be75a7ed433c87ea7f4c968203c23ab6766defdc016f9d
                                                        • Instruction ID: 553468bb54f711fa4ee4bc1b644167f4eef7597cf251fd1686b897572479acdd
                                                        • Opcode Fuzzy Hash: 8499ebcfb489e6abf4be75a7ed433c87ea7f4c968203c23ab6766defdc016f9d
                                                        • Instruction Fuzzy Hash: 382187B5B21740A2FE44DFE6E41C279E3B8ABA4BC0F4645229D0D47755DE3CDC45A720
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID: SOFTWARE\UnknownDB$size
                                                        • API String ID: 3702945584-2725006514
                                                        • Opcode ID: 779c2b9991392ed6cce1135317e07aba87e22e4d6296f17204ed0016e4cc1eee
                                                        • Instruction ID: e2bef63bc97e3677e7fba8dd978324886f338fe8b697c58247d1aec4793b8e90
                                                        • Opcode Fuzzy Hash: 779c2b9991392ed6cce1135317e07aba87e22e4d6296f17204ed0016e4cc1eee
                                                        • Instruction Fuzzy Hash: 7741AD32710600ADEB20DFA6E8547AD77A9F794798F51122AEF1993BA8DF34C50AC704
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: !UnpackJsonToPong$Failed DoHandshake
                                                        • API String ID: 1323251999-1879821257
                                                        • Opcode ID: 3165a10a6efd50f27fc1fa08b378d428c97d6487fd12466fcb4ef25551fb45b5
                                                        • Instruction ID: 7fd0fb257eab2f799432ea009a5b340f600f7007f4f96bb93129737120e2de71
                                                        • Opcode Fuzzy Hash: 3165a10a6efd50f27fc1fa08b378d428c97d6487fd12466fcb4ef25551fb45b5
                                                        • Instruction Fuzzy Hash: B93161613206546CFF04EBA6DC482FD3769EBA2788F421116AB0A479ABDF34C544E344
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: !conContext.Recv$Failed DoHandshake
                                                        • API String ID: 1323251999-3186422887
                                                        • Opcode ID: d2d97e8434d17e397a28033c1717756c4744cc76921495651a119bee157946e6
                                                        • Instruction ID: b4de2bc6527c7b05849d8a457a21384760a5d1becf55d95c014f18b3829d48ad
                                                        • Opcode Fuzzy Hash: d2d97e8434d17e397a28033c1717756c4744cc76921495651a119bee157946e6
                                                        • Instruction Fuzzy Hash: A6117F517106546CFF14E7E7D8482FE36BDEB62B88F521215DF0A17AABDF348504A304
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: closesocket
                                                        • String ID: - $(Connector::NewConnect) Close socket failed : wsaerror=
                                                        • API String ID: 2781271927-707741259
                                                        • Opcode ID: 529f6e05fe6abb8548e5b7cd2e16f0fcbe25e8b479908f2ff8c42762b98f8b6f
                                                        • Instruction ID: ce972f0b81f3302187744fa94a1a643b76b181670b0eb382c42035f5f4d3f395
                                                        • Opcode Fuzzy Hash: 529f6e05fe6abb8548e5b7cd2e16f0fcbe25e8b479908f2ff8c42762b98f8b6f
                                                        • Instruction Fuzzy Hash: DD91D3A1B21644BAFF98EBE1C15C3BE7269A7A4784F121421DE2D13FCBDB7C88516350
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID:
                                                        • API String ID: 1452528299-0
                                                        • Opcode ID: 4538e96ac102df2a0a4a3850ba9e438ae23e103c080f92d35dfd0de32189700d
                                                        • Instruction ID: 98da8d1cf54a541a8dab133542e34222cc65b1b20c8ea66bf2643c2eec57e850
                                                        • Opcode Fuzzy Hash: 4538e96ac102df2a0a4a3850ba9e438ae23e103c080f92d35dfd0de32189700d
                                                        • Instruction Fuzzy Hash: B81161A0B3174062FE5957E1A65D33E21BD9B64B94F060528A92E47BD6EE2CC8C26324
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171229611.0000022E65CA6000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022E65CA6000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65ca6000_rundll32.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Protect$AllocLibraryLoad
                                                        • String ID:
                                                        • API String ID: 3316853933-0
                                                        • Opcode ID: 445d55ed005dda75094cae88cc0beaea78e21e98f820be56d745cd47ff622a99
                                                        • Instruction ID: 497189b57af417b55e1e8d25700a97a26ed0e8d04ab55d524c4b212f29a77ea4
                                                        • Opcode Fuzzy Hash: 445d55ed005dda75094cae88cc0beaea78e21e98f820be56d745cd47ff622a99
                                                        • Instruction Fuzzy Hash: 64320E34618A488FEB94EF6CD85CBA6B7E5F7A8301F40452EE44AC7270DB78D984CB41
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171229611.0000022E65CA6000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022E65CA6000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65ca6000_rundll32.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: f5be49bc1e8f111891236fe2a6516531c999dc70acdc53698341252282824d56
                                                        • Instruction ID: d506a01172fe78cde27aea5e74f7902d595cc501687d47d12c10d422a7301d58
                                                        • Opcode Fuzzy Hash: f5be49bc1e8f111891236fe2a6516531c999dc70acdc53698341252282824d56
                                                        • Instruction Fuzzy Hash: E801FF30118B488FD744EB59D84475AB7E0FBD8315F500A5EB88DE3264DB74D985C746
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$ExitThreadabort
                                                        • String ID:
                                                        • API String ID: 648126024-0
                                                        • Opcode ID: 480519acdbb6fd96c0385158b1c8a62a61d946c4adb0e674378ef05f7c04e450
                                                        • Instruction ID: 171a618d188c3a510eab87b27468551fcf16f5b852de4f04569e1f982b3792e1
                                                        • Opcode Fuzzy Hash: 480519acdbb6fd96c0385158b1c8a62a61d946c4adb0e674378ef05f7c04e450
                                                        • Instruction Fuzzy Hash: CF018495E2174092EF18ABF2E45D2BD126CEB68B54F0A14259E4947797DE3CC885D320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CallsCreateDisableEventLibraryThread_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3949789577-0
                                                        • Opcode ID: c060f208cb0bbe6f208b8bd4b0522e4ad3be3426b3f852664e5414bad9ab7e77
                                                        • Instruction ID: 3bd4d2fbf9f8ca2fb2efa93a06f83e556b05e14bffeb071ca1ba45faf6bd4a86
                                                        • Opcode Fuzzy Hash: c060f208cb0bbe6f208b8bd4b0522e4ad3be3426b3f852664e5414bad9ab7e77
                                                        • Instruction Fuzzy Hash: 3BF0BE73A24A41A6EB249BE0F85AB7E37ACE3A5304F924025D24D42A60CF3DC5489B50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoSystem
                                                        • String ID:
                                                        • API String ID: 31276548-0
                                                        • Opcode ID: 66d0c6b530d1cb0d629dcb88f45c78fd13adcd2f395eed6dca26daddc573beee
                                                        • Instruction ID: e0ccc8fd3dca653be506c3e0df87ef146f6ea28420a474d341989f23744b246d
                                                        • Opcode Fuzzy Hash: 66d0c6b530d1cb0d629dcb88f45c78fd13adcd2f395eed6dca26daddc573beee
                                                        • Instruction Fuzzy Hash: 003148B4A25B90B5FFA99BD1B9483B832ADB774344F560435C50E432A0DF7CC564A361
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 1323251999-0
                                                        • Opcode ID: e290778eb7132fc90cd88f2335ffca8553cd0bc116a22de2dedf3b9c9af34201
                                                        • Instruction ID: d0cc014b4802c4cf3491ca28569ddd932dee24621015e45e62bafe04228e2c2a
                                                        • Opcode Fuzzy Hash: e290778eb7132fc90cd88f2335ffca8553cd0bc116a22de2dedf3b9c9af34201
                                                        • Instruction Fuzzy Hash: 7C018063F106009DFB0087B5C45D3BD7AB4E326738F191714CB792AAD6CBB981858340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Startup_onexit
                                                        • String ID:
                                                        • API String ID: 3012808385-0
                                                        • Opcode ID: b5b183b6b7cfdb3312c0507edf6124ff7aaf5dfed1bf1cfdf3e5dd1730554345
                                                        • Instruction ID: 8a678b7c29cbea3b068cbe7f748791576134b57d992aa159f23b3574ec398fb5
                                                        • Opcode Fuzzy Hash: b5b183b6b7cfdb3312c0507edf6124ff7aaf5dfed1bf1cfdf3e5dd1730554345
                                                        • Instruction Fuzzy Hash: 61E086B1D641A0A6FF50DBD5E48C3B83368F760715F834021C11D82050DE5DC94ADB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocHeap
                                                        • String ID:
                                                        • API String ID: 4292702814-0
                                                        • Opcode ID: 7f9ccc44af7d954cf5240f277ab545f5db75ef3b3c30c7d800823b666a2b9ef7
                                                        • Instruction ID: 5cfb28ec0647cae70d61153515df35b40eb88595755b9ee3ee375c2eac37ddff
                                                        • Opcode Fuzzy Hash: 7f9ccc44af7d954cf5240f277ab545f5db75ef3b3c30c7d800823b666a2b9ef7
                                                        • Instruction Fuzzy Hash: D8F090D0B3260472FE645BE6656D3FD529C5B79B80F4E8831490E963DADE1CC8C17270
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionThrow
                                                        • String ID:
                                                        • API String ID: 432778473-0
                                                        • Opcode ID: fb3a51a595a2477156cc3895975fa3fa8f2a5d3f030891b67057c71804bb0d45
                                                        • Instruction ID: bd7732ee8acf7e3c5422c160cf156b413db7e7afbc345b249191d4641cf2ff0c
                                                        • Opcode Fuzzy Hash: fb3a51a595a2477156cc3895975fa3fa8f2a5d3f030891b67057c71804bb0d45
                                                        • Instruction Fuzzy Hash: FFF0A972715700A6EF60DF96E04417A7768E7E5BC4F554122AB4C43B6ADF3CC552DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocHeap
                                                        • String ID:
                                                        • API String ID: 4292702814-0
                                                        • Opcode ID: e9d90c9a42adbd79a37ac591c907afc828a66ae06a86c502181772668621fe1c
                                                        • Instruction ID: 11cf0f84df2fb62e70cc649391fae67ea99c05eebd28915886beaddb62a4b655
                                                        • Opcode Fuzzy Hash: e9d90c9a42adbd79a37ac591c907afc828a66ae06a86c502181772668621fe1c
                                                        • Instruction Fuzzy Hash: 4AF082E0F3124861FE641BE2584C3BD519C8F757A0F0A06205C2E862E1DA2C88C1B630
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: StringVariant$AllocClearInit$Free_com_issue_error$AddressConvertCreateHandleInstanceModuleProc_com_util::
                                                        • String ID: CoSetProxyBlanket$CommandLine$Create$CreateFlags$ProcessId$ProcessStartupInformation$ROOT\CIMV2$ReturnValue$ShowWindow$Win32_Process$Win32_ProcessStartup$ole32.dll
                                                        • API String ID: 3377340112-2140978212
                                                        • Opcode ID: 019faab4ca756a4454f4dcdad14ff8bb2236d960ff94240162f85fba8c5a6577
                                                        • Instruction ID: 75318a2471d7ab02cb347cc1cd7d8a9a3b93b3fbee619f695d2b58b9207cd1ec
                                                        • Opcode Fuzzy Hash: 019faab4ca756a4454f4dcdad14ff8bb2236d960ff94240162f85fba8c5a6577
                                                        • Instruction Fuzzy Hash: 8B227976710B84A6EF00DFA6E8983AD77B8F798B88F121411DA4E43BA8DF78C544D710
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DeallocateEnumerateFreeMemoryProcessesstd::_
                                                        • String ID: binary_db$check_xen$client_id$cpu_fan_wmi$dsks$isfromdesc$known_files$known_u$kvm_dir$kvm_files$kvm_reg_keys$mems$mod_comp$msmv$num_of_procs$parallels_check_mac$parallels_process$proc_list$psexp_running$qemu_dir$qemu_firmware_acpi$qemu_firmware_smbios$qemu_processes$qemu_reg_key_value$req_disk_enum$sess$user$uuid$vbox_baseborad_wmi$vbox_bus_wmi$vbox_check_mac$vbox_devices$vbox_dirs$vbox_eventlog_wmi$vbox_files$vbox_firmware_acpi$vbox_firmware_smbios$vbox_mac_wmi$vbox_network_class$vbox_pnpentity_controllers_wmi$vbox_pnpentity_pcideviceid_wmi$vbox_pnpentity_vboxname_wmi$vbox_process$vbox_req_key$vbox_req_val$vbox_window_class$virtual_pc_process$virtual_pc_reg_keys$vm_driver_services$vmware_adapter_name$vmware_devices$vmware_dir$vmware_files$vmware_firmware_ACPI$vmware_firmware_smbios$vmware_mac$vmware_processes$vmware_reg_key_value$vmware_reg_keys$wine_exports$wine_req
                                                        • API String ID: 2429326555-4171219946
                                                        • Opcode ID: 3fd9c0fe147a1205d6390c03746200aa51bb6bcb6ea1cb68d0a79f3ad297916e
                                                        • Instruction ID: a0f006445821463ff46c8d4b68e836059e56b039ccba98b72378f99febc41523
                                                        • Opcode Fuzzy Hash: 3fd9c0fe147a1205d6390c03746200aa51bb6bcb6ea1cb68d0a79f3ad297916e
                                                        • Instruction Fuzzy Hash: B123E0B2215BC19DDBB0DF74EC413EA33A8F759348F50152AA68C9BB69EF348258C714
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Free$AllocClearVariant$BlanketConvertCreateInstanceProxy_com_issue_error_com_util::
                                                        • String ID: CommandLine$Create$CreateFlags$ProcessId$ProcessStartupInformation$ROOT\CIMV2$ReturnValue$Win32_Process$Win32_ProcessStartup
                                                        • API String ID: 3425408570-2022159726
                                                        • Opcode ID: 3175596cad473eb6e64dc97ed313adc46f0e0233b010c1d0d24b80d48aa0ec13
                                                        • Instruction ID: fc97cc0162edd84fc6799d715e4c772ed284b85b99ff5757eefe4ab1db3f1419
                                                        • Opcode Fuzzy Hash: 3175596cad473eb6e64dc97ed313adc46f0e0233b010c1d0d24b80d48aa0ec13
                                                        • Instruction Fuzzy Hash: 09125876710B8496EB10DFA6E8583AE77B8F798B98F114125DE8E47B68CF38C548D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Wow64$Redirection$AttributesCombineCurrentDirectoryDisableFilePathProcessRevertWindows
                                                        • String ID: Checking file %s $System32\VBoxControl.exe$System32\drivers\VBoxGuest.sys$System32\drivers\VBoxMouse.sys$System32\drivers\VBoxSF.sys$System32\drivers\VBoxVideo.sys$System32\vboxdisp.dll$System32\vboxhook.dll$System32\vboxmrxnp.dll$System32\vboxogl.dll$System32\vboxoglarrayspu.dll$System32\vboxoglcrutil.dll$System32\vboxoglerrorspu.dll$System32\vboxoglfeedbackspu.dll$System32\vboxoglpackspu.dll$System32\vboxoglpassthroughspu.dll$System32\vboxservice.exe$System32\vboxtray.exe
                                                        • API String ID: 2137468328-1036852472
                                                        • Opcode ID: 19f1c621f6e112c317721e5d1c740a0029c6832e1d5a7042bee00aafde7e8dc2
                                                        • Instruction ID: 0944c60c8bf907ee815e94ed8eb518dffdb8af82d3d8ede6042367652e335f8d
                                                        • Opcode Fuzzy Hash: 19f1c621f6e112c317721e5d1c740a0029c6832e1d5a7042bee00aafde7e8dc2
                                                        • Instruction Fuzzy Hash: F361B2B1B10B80A9FF10CB91E8482EA77ACF7A4784F920126DA8D47BA4DF3CC545D790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ArraySafe$String$Uninitialize$AllocBoundClearDataFreeInitializeVariant$AccessCreateElementInstanceSecurityUnaccess
                                                        • String ID: FileName$SELECT * FROM Win32_NTEventlogFile$Sources$System$VBoxVideoW8$VBoxWddm$WQL$vboxvideo
                                                        • API String ID: 3465144543-1865646205
                                                        • Opcode ID: 441cb62044896833126615da1cec528b37880cbdc4505c74feca0024acaa52e3
                                                        • Instruction ID: 56de049a3774964cfd3da968bb40ab2f501521a2d083f0bb99d57ce45095aa98
                                                        • Opcode Fuzzy Hash: 441cb62044896833126615da1cec528b37880cbdc4505c74feca0024acaa52e3
                                                        • Instruction Fuzzy Hash: 31913CB2B10B91AAEF10CFA2E8486AC33B8F758B88F415511CE4E57B58DF39C549D350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseHandleService$EnumManagerOpenServicesStatus
                                                        • String ID: Failed to get SCM handle.$Failed to get services list.$ServicesActive$VBoxGuest$VBoxMouse$VBoxSF$VBoxWddm$vmci$vmhgfs$vmmemctl$vmmouse$vmusb$vmusbmouse$vmx86$vmx_svga$vmxnet
                                                        • API String ID: 3747942150-804508089
                                                        • Opcode ID: 386779f08c4d84eaf10b284d34603d7e7f4b6b2dfa2085a4d07eb0263c571e5e
                                                        • Instruction ID: 8aeb003b2260b9718c19ba3d2f9a98cbf296cf929b84f49fe2de048994115502
                                                        • Opcode Fuzzy Hash: 386779f08c4d84eaf10b284d34603d7e7f4b6b2dfa2085a4d07eb0263c571e5e
                                                        • Instruction Fuzzy Hash: F3515D72715B80A5EF209F82F44C3AA7BA8F758780F821226DA8D47B64EF3CC545E750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$ClearUninitializeVariantwcsstr$AllocFreeInitialize$CreateInstanceSecurity
                                                        • String ID: Caption$Name$PNPDeviceID$SELECT * FROM Win32_PnPDevice$VBOX$VEN_VBOX$WQL
                                                        • API String ID: 3295136966-607120894
                                                        • Opcode ID: c291bffffa07478fd836a497020b2e208a28a2d4463ff92d044e135b7f9c6f2d
                                                        • Instruction ID: 32b40c7c3bda0733242f1ad8146ee6ec606226596b25c64b14bb6386ea2ce456
                                                        • Opcode Fuzzy Hash: c291bffffa07478fd836a497020b2e208a28a2d4463ff92d044e135b7f9c6f2d
                                                        • Instruction Fuzzy Hash: 96818D72710B50A6EF10DFA6E8482AC37A8F794B88F451116EE4E43FA8DF39C985D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: Checking if username matches : %s $CurrentUser$Emily$HAPUBWS$Hong Lee$IT-ADMIN$John Doe$Johnson$Miller$Peter Wilson$Sandbox$maltest$malware$milozs$sand box$test user$timmy$virus
                                                        • API String ID: 2645101109-2358638013
                                                        • Opcode ID: cd5de68b56669a9d0272e00acef36d7b312e5858eda286ea6a1e19b1a615369a
                                                        • Instruction ID: b7a31201e677b27bafd1e818b74212b59b36c4221b1045447d79536077e1421c
                                                        • Opcode Fuzzy Hash: cd5de68b56669a9d0272e00acef36d7b312e5858eda286ea6a1e19b1a615369a
                                                        • Instruction Fuzzy Hash: 60411875625B80A5EE10CB91F48C3EA7BB8F758780F420226DA8C0BB65EF3DC546D750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Close$InfoOpenQuery
                                                        • String ID: System\CurrentControlSet\Enum\IDE$System\CurrentControlSet\Enum\SCSI$VMW$Virtual$qemu$vbox$virtio$vmware$xen
                                                        • API String ID: 796878624-373962024
                                                        • Opcode ID: 66d27574bf8490147d9661f5dcad80fd1134433e16cd29cc104d66086d3bf0ac
                                                        • Instruction ID: 33c7fd5dbdc4f98ea65cf21bac6d1a3ce5f75ba83ab100841f40dba49fa90bed
                                                        • Opcode Fuzzy Hash: 66d27574bf8490147d9661f5dcad80fd1134433e16cd29cc104d66086d3bf0ac
                                                        • Instruction Fuzzy Hash: DE614B72B14B40A9EB10CFA2E8483AD77B9F758788F511126DE8E13B68DF38C516E740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$CompletionCopyCriticalExceptionQueuedSectionStatus$EnterInit_thread_footerLeavePostTimerWaitable
                                                        • String ID: pqcs
                                                        • API String ID: 2677216780-2559862021
                                                        • Opcode ID: ee932694cd8f86d815e17b7a4b261ff25cd91e729fac6a5c64c4f1b8fbde0530
                                                        • Instruction ID: ae66ae2378dd0ba83360b662643844b4b60ff2b762dae7644e370d83b873faf5
                                                        • Opcode Fuzzy Hash: ee932694cd8f86d815e17b7a4b261ff25cd91e729fac6a5c64c4f1b8fbde0530
                                                        • Instruction Fuzzy Hash: 18D19E72704B809AEB61CFA6E8443AD77B8F7AAB54F115225DB8E87B54DF38C441D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Internet$CloseHandle$Open$Concurrency::cancel_current_taskDeallocateFileReadstd::_
                                                        • String ID: IP retriever$http://myexternalip.com/raw$https://api.ipify.org/
                                                        • API String ID: 3644404261-3426027295
                                                        • Opcode ID: 09be6dc9282f5756e1107aa8f59317cb4e0320d1d3353bc14e850a782783f2b7
                                                        • Instruction ID: fd0bcd300feea3f79ba5ffcb72283343192acfcc9ec322794929e1d6a721a780
                                                        • Opcode Fuzzy Hash: 09be6dc9282f5756e1107aa8f59317cb4e0320d1d3353bc14e850a782783f2b7
                                                        • Instruction Fuzzy Hash: FA61C173718B80ABEB10CBA6E8446AEB7B8F391B94F510515EF8903B58CF78C551EB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InitializeStringUninitialize$AllocCreateFreeInstanceSecurity
                                                        • String ID: ROOT\CIMV2
                                                        • API String ID: 3548430535-2786109267
                                                        • Opcode ID: 630a26aa946af55944c0e0a5a59d3c64d14703e70f69e1f3ab729343518a6ab3
                                                        • Instruction ID: 046c021cfc4c1b3109a15aaa534edadc11c14703e2cfdc9644851341620fd4bd
                                                        • Opcode Fuzzy Hash: 630a26aa946af55944c0e0a5a59d3c64d14703e70f69e1f3ab729343518a6ab3
                                                        • Instruction Fuzzy Hash: 3331A072614B8196EB10CF66F80862EB7A8F798B84F054215EB8E83B54DF3CC505DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Heap$Process$AdaptersAllocFreeInfo
                                                        • String ID:
                                                        • API String ID: 2824440793-0
                                                        • Opcode ID: 4950bd5bdeacdfdccbc7802f447cea47fcd7c090d79a4788ba921cd69a7babce
                                                        • Instruction ID: 8b99dc6ea9b0a47d2cc676ba2414ea3c19bcc76255f27ca9943dd3d4f82b5184
                                                        • Opcode Fuzzy Hash: 4950bd5bdeacdfdccbc7802f447cea47fcd7c090d79a4788ba921cd69a7babce
                                                        • Instruction Fuzzy Hash: 59310821715680A2EF548BA7B40C27D77E5EBA9B90F095034DF8E43B69DF3CC8819750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$CreateCriticalExceptionSectionThrow$CurrentEnterFileInit_thread_footerLeaveNamedPipeProcess
                                                        • String ID: ) failed$create_file() failed$create_named_pipe(
                                                        • API String ID: 1707646108-456399844
                                                        • Opcode ID: 4f1e8f0a353e28c85b607ea10eb05727bac05d1834282eb899e924ae328a4506
                                                        • Instruction ID: dafbf03b277b5fe73c2a323a8f5f9b828548860b1be8a5ab37a13d7b047bc12d
                                                        • Opcode Fuzzy Hash: 4f1e8f0a353e28c85b607ea10eb05727bac05d1834282eb899e924ae328a4506
                                                        • Instruction Fuzzy Hash: B851EF72614B80AAEF00DFA6E8482ED7764F3A57A0F414321EB5D43BA9DF38C545D700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b652138081822217982cd22338e72b9852c0c5ce673a08e299d18ca0e452ed9a
                                                        • Instruction ID: 4d085d19c13a13e4b158f0db8ef0b674696d21666436123ca5030f72f88c2664
                                                        • Opcode Fuzzy Hash: b652138081822217982cd22338e72b9852c0c5ce673a08e299d18ca0e452ed9a
                                                        • Instruction Fuzzy Hash: 74022732346B859ADF70DFA6E45423EB3B8F364B44B524526C79E83B51EF38E4529340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process32$CloseHandleNext$CreateFirstSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 3656348920-0
                                                        • Opcode ID: 8acb61856b03c74a8c73c64066d62b0e70953c267da559444172a3bef2378ea4
                                                        • Instruction ID: a915e553cae33e5143641c92d0bd203ea77fcaa7bda4f1d737866efdfcbf50d9
                                                        • Opcode Fuzzy Hash: 8acb61856b03c74a8c73c64066d62b0e70953c267da559444172a3bef2378ea4
                                                        • Instruction Fuzzy Hash: 5921D761314680A6EF60CB62E54C77A73A4F7A8FD4F4642208AAD876D4EF3DC909D710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastLocale$CodeInfoPageValid$DefaultEnumLocalesProcessSystemUserabort
                                                        • String ID:
                                                        • API String ID: 3941709727-0
                                                        • Opcode ID: e1fd24d0581ce7a047bb9014cd37ef04ee026e3d2b986cde5182990ae1c8caa3
                                                        • Instruction ID: 0c2bcfc4e4a0d21dc89b2d779d5c59311cabd3d07738588e114110577dbcb992
                                                        • Opcode Fuzzy Hash: e1fd24d0581ce7a047bb9014cd37ef04ee026e3d2b986cde5182990ae1c8caa3
                                                        • Instruction Fuzzy Hash: 86719DB2F20740A9FF10ABA1D8587BC33B8B774744F4640258E0E676A5DB3D8949E3A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CompletionQueuedStatus$CloseErrorHandleLastPostTimerWaitable
                                                        • String ID: pqcs
                                                        • API String ID: 3092740338-2559862021
                                                        • Opcode ID: c60b755a3fa73338e78e0d8a0922e16ef7380b5e9b52552ea72652d36805b5a0
                                                        • Instruction ID: 9670215ad87974817829006a4890e3baaf206288a083df5b80608d03611ae7c5
                                                        • Opcode Fuzzy Hash: c60b755a3fa73338e78e0d8a0922e16ef7380b5e9b52552ea72652d36805b5a0
                                                        • Instruction Fuzzy Hash: 0A712632701B40AAEB64CFB6E5943AC33B8F759B48F15422AAB4D97B84DF34C426D740
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastNameTranslatewcschr$CodePageValidabort
                                                        • String ID:
                                                        • API String ID: 4237316620-0
                                                        • Opcode ID: bc390fcc964dcb77d1e5c2fb1dc2a8eeb8c4d5e1149440121b8afb41b159e969
                                                        • Instruction ID: fe9b3be2f1de39a6e2d14a791685528266d6e247ac38d5a6267d30cefb9d93be
                                                        • Opcode Fuzzy Hash: bc390fcc964dcb77d1e5c2fb1dc2a8eeb8c4d5e1149440121b8afb41b159e969
                                                        • Instruction Fuzzy Hash: 9E81D6B2A20740A1EF209F91D40A7B933ACF7B4B84F4A4121DB5E577A5DB7CC541E760
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 1239891234-0
                                                        • Opcode ID: 458ed2804a41ba25c9061f679611f881ffa7e40ef83040f5a1897f1bbc151955
                                                        • Instruction ID: 95389edd12a75cdf706c18e941045c7c1e35f65f2a54c873ce9bb91ce16140ce
                                                        • Opcode Fuzzy Hash: 458ed2804a41ba25c9061f679611f881ffa7e40ef83040f5a1897f1bbc151955
                                                        • Instruction Fuzzy Hash: AB31A3B2624F80A6DF60CF65E8483AE73A8F798754F510125EA8D47B94DF3CC556CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: ZwQueryInformationProcess$ntdll.dll
                                                        • API String ID: 1646373207-132032222
                                                        • Opcode ID: bcc60d8edaf1c71ffae8ee34be7ebbff2edeef94103e3c030f6d9e12e1c3fa26
                                                        • Instruction ID: 632822f097c5a857a7850f6fa95591957a1240b982bf5fc58fcb2466f3b181c9
                                                        • Opcode Fuzzy Hash: bcc60d8edaf1c71ffae8ee34be7ebbff2edeef94103e3c030f6d9e12e1c3fa26
                                                        • Instruction Fuzzy Hash: 0F511271721B40A2EF65CB92F4043A963A8FBA8BC4F4640369E5D53B98DF3CC602D760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EnumServicesStatus$ErrorLast
                                                        • String ID: ERROR: %u
                                                        • API String ID: 1500475886-3825433098
                                                        • Opcode ID: 30e6fa4fc0fc0a398d6cd09b5f113e1fd6298f65ea8726ef9f357e7766e51079
                                                        • Instruction ID: 1ce85faf597e88e34c424a060a961f960911647d8ef6ac8c509d492ae6838a8b
                                                        • Opcode Fuzzy Hash: 30e6fa4fc0fc0a398d6cd09b5f113e1fd6298f65ea8726ef9f357e7766e51079
                                                        • Instruction Fuzzy Hash: A4414D32714B809ADB60CF52F80836AB7A9F798B90F594425EECD47B58EF39C495DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: IPCA$IPCA$VBOX$VirtualBox$vbox
                                                        • API String ID: 0-3852232254
                                                        • Opcode ID: f72550421a20e4bfa76ee953408b8eb82890fb2b56499b727df43f9623c43fc2
                                                        • Instruction ID: 6e68e4f755f208401138c9cb4b2208cfdd64b317da43bb16fe29958f07d26b90
                                                        • Opcode Fuzzy Hash: f72550421a20e4bfa76ee953408b8eb82890fb2b56499b727df43f9623c43fc2
                                                        • Instruction Fuzzy Hash: 695138B27116C45AEE15C7D79C2837967D9F7A4B90F1A1421DF0E47B91DB3EC882A700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Wcsftime$_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 4239037671-0
                                                        • Opcode ID: 671d3d929c3f5de04b62b184aedfc7bc5fd528498d2adc415f59486259b6cc80
                                                        • Instruction ID: 2455e02e974451fdf73928b514273cf92451e7b9ebac37af04fd59ec17d97405
                                                        • Opcode Fuzzy Hash: 671d3d929c3f5de04b62b184aedfc7bc5fd528498d2adc415f59486259b6cc80
                                                        • Instruction Fuzzy Hash: E57126A2A3078052EF689BB5A04937E629CF7A8794F154225EF9E47FD5CF3CC4819720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Server$ListeningMgmtStopUnregister
                                                        • String ID:
                                                        • API String ID: 3697950855-0
                                                        • Opcode ID: 0c77d112ef31bffd8d83861e9d7c19ca5bfb867fe1feabc1652df6b8b4b496b2
                                                        • Instruction ID: d13f0382eea86dcbe1a3cf6e087546285497bc26c6d6a9f3860284d8084318a8
                                                        • Opcode Fuzzy Hash: 0c77d112ef31bffd8d83861e9d7c19ca5bfb867fe1feabc1652df6b8b4b496b2
                                                        • Instruction Fuzzy Hash: 88D0A750B2225072FF5C2B73085E337029EAB51700FA5541C460682280CE1DC1066510
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BindingFree
                                                        • String ID:
                                                        • API String ID: 3284907940-0
                                                        • Opcode ID: 39c437bc65d0c6fe3b9c0f26e31c815dce4a8d102d3196e772f3e180d517cb4f
                                                        • Instruction ID: 7a726a6e863e70d8f79eba03c41f761e28a2263835025ea14b45573b2d3ee6e1
                                                        • Opcode Fuzzy Hash: 39c437bc65d0c6fe3b9c0f26e31c815dce4a8d102d3196e772f3e180d517cb4f
                                                        • Instruction Fuzzy Hash: 82F0C2E1721B80F5EF40CF95E84D37962A4EB28B41F525025D69D43311DB3CC4919780
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BindingFree
                                                        • String ID:
                                                        • API String ID: 3284907940-0
                                                        • Opcode ID: edbb4f16a4d90ac1f152923a6712b6dd56f2400c020450ff33e4ece259cb0413
                                                        • Instruction ID: c06ec45c0db3ba7d78e4034071072185f6fbddc0016ce325820dfca2d3ded338
                                                        • Opcode Fuzzy Hash: edbb4f16a4d90ac1f152923a6712b6dd56f2400c020450ff33e4ece259cb0413
                                                        • Instruction Fuzzy Hash: 12F0C2E1725A80A5EF40CB95F84C3BD63B5EB28741F925021965D83310DB3CC4919780
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BindingFree
                                                        • String ID:
                                                        • API String ID: 3284907940-0
                                                        • Opcode ID: 128418ccb044278a4ad303cc0ddc6d9724c84b0e0090fceed704ba11e3e187a8
                                                        • Instruction ID: 656354fcf6f2a14a6f908bc303fd81eb7e675cdf189e2adc4fe8eab709a66ebf
                                                        • Opcode Fuzzy Hash: 128418ccb044278a4ad303cc0ddc6d9724c84b0e0090fceed704ba11e3e187a8
                                                        • Instruction Fuzzy Hash: CBF062F1A25B40E5EF40CB95F84C37962B4EB28781F524125D65D47315DB3CC591E780
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BindingFree
                                                        • String ID:
                                                        • API String ID: 3284907940-0
                                                        • Opcode ID: 782cdc6fe03ab50c9a9155f34b52d4867ccd057917633eb0578ce3aa3b59e779
                                                        • Instruction ID: c6e83899e60ffad93a12e0a73227d8118857d3ad443ae2ed726d43f4e40739e8
                                                        • Opcode Fuzzy Hash: 782cdc6fe03ab50c9a9155f34b52d4867ccd057917633eb0578ce3aa3b59e779
                                                        • Instruction Fuzzy Hash: 890181F1A20A40A6EF508B95F88C37D73B9EB68741F524021E64D46315DF3CC490E790
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HeapProcess
                                                        • String ID:
                                                        • API String ID: 54951025-0
                                                        • Opcode ID: 14b52df1aa1af65d0f8922f4835bc1d0091d635f9217b4acff120a0806aa9cf6
                                                        • Instruction ID: 43eded02dcb41795f087271b84b256424f3ddd6e8a039ac1b5570cbcaa33eedd
                                                        • Opcode Fuzzy Hash: 14b52df1aa1af65d0f8922f4835bc1d0091d635f9217b4acff120a0806aa9cf6
                                                        • Instruction Fuzzy Hash: 07E08CA0B22B41A2FF694BDAA44973422E8E779750E590028CA1C02760EB2C4896A350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$ErrorLast$__std_exception_copy$CleanupCloseCodeCompletionCurrentExceptionExitHandleInit_thread_footerObjectPostProcessQueuedSingleStartupStatusThreadThrowWait
                                                        • String ID: wait error$winsock$;'$~5
                                                        • API String ID: 1372613006-3302331494
                                                        • Opcode ID: acd9ad1e5966a5bea6a155be71fe17c0c05faff9d9e14f245ff23c2fd5b5276f
                                                        • Instruction ID: 4275a951870ce39d4e4e1df47f90e8556008057ebc465637faf04771706e4058
                                                        • Opcode Fuzzy Hash: acd9ad1e5966a5bea6a155be71fe17c0c05faff9d9e14f245ff23c2fd5b5276f
                                                        • Instruction Fuzzy Hash: CC420472609BC4A5DA71CB55F8843EAB3A8F7DA780F415226DBCD43A59EF38C194DB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Wow64$Redirection$AttributesCombineCurrentDirectoryDisableFilePathProcessRevertWindows
                                                        • String ID: Checking file %s $System32\drivers\vm3dmp.sys$System32\drivers\vmci.sys$System32\drivers\vmhgfs.sys$System32\drivers\vmkdb.sys$System32\drivers\vmmemctl.sys$System32\drivers\vmmouse.sys$System32\drivers\vmnet.sys$System32\drivers\vmnetadapter.sys$System32\drivers\vmnetuserif.sys$System32\drivers\vmrawdsk.sys$System32\drivers\vmusb.sys$System32\drivers\vmusbmouse.sys$System32\drivers\vmx86.sys
                                                        • API String ID: 2137468328-73234479
                                                        • Opcode ID: 9417b62189eae95cf3fee40aa5efdfeb15f3d303e414f987d350ef9f12dca044
                                                        • Instruction ID: 4ff0773956e50eb2d695a98c942b8617b2e2a849097770c7f1160fc3cc180d6d
                                                        • Opcode Fuzzy Hash: 9417b62189eae95cf3fee40aa5efdfeb15f3d303e414f987d350ef9f12dca044
                                                        • Instruction Fuzzy Hash: E251C172B20B80A9EF10CB96E8583EA77ACF7A4784F460122DA4D47BA4DF3CC545D750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Stringwcsstr$Uninitialize$AllocFreeInitialize$ClearCreateInstanceSecurityVariant
                                                        • String ID: 82371SB$82441FX$82801FB$Name$OpenHCD$SELECT * FROM Win32_PnPEntity$WQL
                                                        • API String ID: 411316520-1350769890
                                                        • Opcode ID: ef3ef85b2817ed31e82152c3327c49ac498b9ea8620bfc31cdd3e8f090d8b04d
                                                        • Instruction ID: a62d6844385cc1c92b608c7a3f38663f92c25d26762517f4769d49a32fe543d9
                                                        • Opcode Fuzzy Hash: ef3ef85b2817ed31e82152c3327c49ac498b9ea8620bfc31cdd3e8f090d8b04d
                                                        • Instruction Fuzzy Hash: 26516F72710B459AEF108FA6E8482AC77A8F7A8B98F461112EF4E43B68DF39C545D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitialize$AllocClearFreeInitializeVariant$CreateInstanceSecurity
                                                        • String ID: HVM domU$Model$SELECT * FROM Win32_ComputerSystem$VMWare$VirtualBox$WQL
                                                        • API String ID: 2296585391-4167877488
                                                        • Opcode ID: 9cde83bbbcd28c803077783c89919f3d6436b3b66b97434dded9bf5af39e063f
                                                        • Instruction ID: 2cd110039e3cb1c8252cefb45929b2a5d632ec4f198744f213f6812547d48efc
                                                        • Opcode Fuzzy Hash: 9cde83bbbcd28c803077783c89919f3d6436b3b66b97434dded9bf5af39e063f
                                                        • Instruction Fuzzy Hash: D9513C76711B41AAEF11CFA2E8482AC37A8F7A8F98F455125DE4E43B58DF38C549D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Wow64$Redirection$AttributesCombineCurrentDirectoryDisableFilePathProcessRevertWindows
                                                        • String ID: Checking file %s $System32\drivers\balloon.sys$System32\drivers\netkvm.sys$System32\drivers\pvpanic.sys$System32\drivers\viofs.sys$System32\drivers\viogpudo.sys$System32\drivers\vioinput.sys$System32\drivers\viorng.sys$System32\drivers\vioscsi.sys$System32\drivers\vioser.sys$System32\drivers\viostor.sys
                                                        • API String ID: 2137468328-3181514389
                                                        • Opcode ID: 13fc9bd882d0352bad5dd1aa1d27485b42f4cd5d7e33db5c04d8b1f0c0470a2c
                                                        • Instruction ID: c6bbdb8d5a0541d457a1827b28147657943b3422c2768445b31c50f3af15939a
                                                        • Opcode Fuzzy Hash: 13fc9bd882d0352bad5dd1aa1d27485b42f4cd5d7e33db5c04d8b1f0c0470a2c
                                                        • Instruction Fuzzy Hash: AA51C672714B40AAEF20CB96E8583EA77A9F7A4784F860122DA8D43BA4DF3CC545D750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitialize$AllocClearFreeInitializeVariantwcsstr$CreateInstanceSecurity
                                                        • String ID: Manufacturer$Oracle Corporation$Product$SELECT * FROM Win32_BaseBoard$VirtualBox$WQL
                                                        • API String ID: 1677851102-1142199694
                                                        • Opcode ID: 71325753381b062dfe9f22e382b6f96eceae306c31ec024c4a8a303219fc17d9
                                                        • Instruction ID: dfd2f54158e3e2783a8271e80ee8f9bf34e20d106efaeaea8101e9ff2cedb8b9
                                                        • Opcode Fuzzy Hash: 71325753381b062dfe9f22e382b6f96eceae306c31ec024c4a8a303219fc17d9
                                                        • Instruction Fuzzy Hash: 28813272701B80AAEB10CFB6E8583AD33A8FB94B88F115426DE4D47B68DF39C559D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitializewcsstr$AllocFreeInitialize$ClearCreateInstanceSecurityVariant
                                                        • String ID: ACPIBus_BUS_0$Name$PCI_BUS_0$PNP_BUS_0$SELECT * FROM Win32_Bus$WQL
                                                        • API String ID: 721339888-2399075642
                                                        • Opcode ID: a0a0edbca1b239832c5567b5d01ee201a0486bb9b2a4b095e197fb82ea787f9b
                                                        • Instruction ID: ec330d1624a44e5e22bca3dff36f31811d7e656b276ae9966362477189ffa30d
                                                        • Opcode Fuzzy Hash: a0a0edbca1b239832c5567b5d01ee201a0486bb9b2a4b095e197fb82ea787f9b
                                                        • Instruction Fuzzy Hash: F4515E72700B4096EF109F66D8842AC77A8FBA8B98F165116DF4E43F68DF39C545D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast$CreateEvent$DeallocateInit_thread_footerObjectSingleWait__std_exception_copystd::_
                                                        • String ID: thread$thread.entry_event$thread.exit_event
                                                        • API String ID: 2962460297-3017686385
                                                        • Opcode ID: cf8ba38e9baeeb78dc4d38b3d433cb89bbbd7952847ddaffff5848a23655a87d
                                                        • Instruction ID: 3945d7e1b6fca54403923e946895910c420db21cd4c5fe1498c38c845b719c7a
                                                        • Opcode Fuzzy Hash: cf8ba38e9baeeb78dc4d38b3d433cb89bbbd7952847ddaffff5848a23655a87d
                                                        • Instruction Fuzzy Hash: 9D51C472711B80AAEF10DBA2E8583BD33A8F7A5B94F018625AA1E47795DF3CC516D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Path$ExtensionFileFindNameRemove
                                                        • String ID: Checking if process file name contains: %s $Checking if process file name looks like a hash: %s $bot.exe$klavme.exe$malware.exe$myapp.exe$sample.exe$sandbox.exe$test.exe$testapp.exe
                                                        • API String ID: 583738052-4190982602
                                                        • Opcode ID: 190950c614020018430969553ce8939ee10bc21674c72cb395e33e65cd0b9073
                                                        • Instruction ID: 720a75ce400dbf5fe3a750ce734c081e558374ca14ac0ad93d853ae16ffadb5c
                                                        • Opcode Fuzzy Hash: 190950c614020018430969553ce8939ee10bc21674c72cb395e33e65cd0b9073
                                                        • Instruction Fuzzy Hash: 8B41B375714B84A5EE609B42F4AD3BA77A8F7A8790F450222CA8D43BA4DF3CC055D750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$CurrentProcessUninitialize
                                                        • String ID: -Command "Wait-Process -Id $ -Recurse"$" -Force$; Remove-Item -Path "$powershell
                                                        • API String ID: 707173123-1183931778
                                                        • Opcode ID: 04d861c4d53275a9c9e28dada9498484e8ae7043484da7a97280d41dd142acaa
                                                        • Instruction ID: 439ed26ce0ebfc2ccf18bb27df325676a0e17223843202988c69f43b444bf345
                                                        • Opcode Fuzzy Hash: 04d861c4d53275a9c9e28dada9498484e8ae7043484da7a97280d41dd142acaa
                                                        • Instruction Fuzzy Hash: A7818A62B00B80AAEF10CBB6D8446EE377AE711B88F514516DF5D23BAADF30C515E784
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitialize$AllocFreeInitialize$ClearCreateInstanceSecurityVariantwcsstr
                                                        • String ID: 08:00:27$MACAddress$SELECT * FROM Win32_NetworkAdapterConfiguration$WQL
                                                        • API String ID: 2560539382-232164535
                                                        • Opcode ID: 0b05267085d69751576c5fa1df170cba9ecff2f103616c55038b08c3985cf6bb
                                                        • Instruction ID: e7fae62f2ccbf5fb5baaa7cb44c619da1eb07d737d02cd3a541dd0312dae0819
                                                        • Opcode Fuzzy Hash: 0b05267085d69751576c5fa1df170cba9ecff2f103616c55038b08c3985cf6bb
                                                        • Instruction Fuzzy Hash: 71513A72700B909AEF109F66E8882AD67A8F798F98F055115EF4E43F58CF39C885D314
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitialize$AllocFreeInitialize$ClearCreateInstanceSecurityVariantwcsstr
                                                        • String ID: DeviceId$PCI\VEN_80EE&DEV_CAFE$SELECT * FROM Win32_PnPEntity$WQL
                                                        • API String ID: 2560539382-342862491
                                                        • Opcode ID: cf660a0d0e485e3e0821f4ea76faae67b610638f70d5b1c20fa5aab47c590efa
                                                        • Instruction ID: bf4c52f5adbffc755c2b2e21d9ff55abf4c34ef2c5acd83dfcbeea1ce24bc510
                                                        • Opcode Fuzzy Hash: cf660a0d0e485e3e0821f4ea76faae67b610638f70d5b1c20fa5aab47c590efa
                                                        • Instruction Fuzzy Hash: 00517B77700B909AEB109F62E84826D77A8F794F98F061515EE4E43F58DF39C485D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: ZwAllocateVirtualMemory$ZwGetContextThread$ZwReadVirtualMemory$ZwSetContextThread$ZwWriteVirtualMemory$ntdll.dll
                                                        • API String ID: 667068680-1731939869
                                                        • Opcode ID: 4a81ed012dcd6642a0233e0a904d07027e8350104a5ef464071741b95219fc56
                                                        • Instruction ID: 75ffe7f8f240b4381de454b75cbce423b116da5426f27d5048fc0fa5f48d2df4
                                                        • Opcode Fuzzy Hash: 4a81ed012dcd6642a0233e0a904d07027e8350104a5ef464071741b95219fc56
                                                        • Instruction Fuzzy Hash: 4C1100A8B22B01B5FE05DB86B85C33427ADAB69751F4B10248D5E03361FF7CD555E320
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Command :
                                                        • API String ID: 1323251999-3275149113
                                                        • Opcode ID: ef60ed1ce797cf69ca36319ecbba45193d77b362b60c0371bf6d77b4f903318d
                                                        • Instruction ID: 4450d87cb4216c31afbd23e4392ab0e5cd68b35d73fe813e3435c8bee550a2d4
                                                        • Opcode Fuzzy Hash: ef60ed1ce797cf69ca36319ecbba45193d77b362b60c0371bf6d77b4f903318d
                                                        • Instruction Fuzzy Hash: FE916A72718B909AEB00CBA6E8445AE77B9F352B84F511515EF9913FAECF34C050EB14
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$Uninitialize$AllocFreeInitialize$ClearCreateInstanceSecurityVariant
                                                        • String ID: SELECT * FROM Win32_LogicalDisk$Size$WQL
                                                        • API String ID: 1983726959-274750787
                                                        • Opcode ID: 5c6d1d1d7cc69962b546d2afd02027d6d62ab293970e714a47473fc973cdad8c
                                                        • Instruction ID: 21feea30e099aaa520d0d024927e4c1a476702d53910a5a2506ed02181cbe42d
                                                        • Opcode Fuzzy Hash: 5c6d1d1d7cc69962b546d2afd02027d6d62ab293970e714a47473fc973cdad8c
                                                        • Instruction Fuzzy Hash: 5F516C72710A50AAEF14CFA2E4486AC37B8FB94F98F465111EE4E03B94CF38C485D300
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NtQueueApcThread$is program cannot be run in DOS mode.$$ntdll.dll
                                                        • API String ID: 0-1695160815
                                                        • Opcode ID: 9be1b87c1db1c18c7ce90f72536bf3e48b619575d7ae131a9198b1d767078c00
                                                        • Instruction ID: e27b6fbb3f6d607b1e80ed9fee7643741d4dbfc4d2d5a0bb78f5dba0eb3d94a5
                                                        • Opcode Fuzzy Hash: 9be1b87c1db1c18c7ce90f72536bf3e48b619575d7ae131a9198b1d767078c00
                                                        • Instruction Fuzzy Hash: 4A81D162B10B41AAEF41CFA6E8486BC27B8F768B88F129211CF1C53755EF34C582D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$CurrentProcess
                                                        • String ID: -Command "Wait-Process -Id $" -Force$; Remove-Item -Path "$powershell
                                                        • API String ID: 1011286393-2725262429
                                                        • Opcode ID: 4e514233196b107d0873afa56756a74ac3cebf1d3976237dd14b49c3fe5f25d8
                                                        • Instruction ID: ccae2578177d05c3a5eb96e75f3dc53b21340033c2c87327535c81a7b6468444
                                                        • Opcode Fuzzy Hash: 4e514233196b107d0873afa56756a74ac3cebf1d3976237dd14b49c3fe5f25d8
                                                        • Instruction Fuzzy Hash: 6C51C172700A80AAEF10CFA5D8842EE37B9E711798F514229DF5963BEACF30C516E744
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseHandle$CompletionCriticalDeallocateDeleteErrorInit_thread_footerLastPostQueuedSectionStatus__std_exception_copystd::_
                                                        • String ID: pqcs
                                                        • API String ID: 2229371356-2559862021
                                                        • Opcode ID: d9236eaaddc4e12c8e375aa211b7f544d910b76fdf75790bee41a16bd9ef96c2
                                                        • Instruction ID: fc1b53ddd8bf4a3404b67d49a39dcaa0b5016b9e1a0375b48ab94d9fcc9786aa
                                                        • Opcode Fuzzy Hash: d9236eaaddc4e12c8e375aa211b7f544d910b76fdf75790bee41a16bd9ef96c2
                                                        • Instruction Fuzzy Hash: 9751E272311B40AAEF54CFA2D5587BA73A8F7AAF94F0A52258B4E43390DF38C855D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocateclosesocketconnectgetsocknamehtonsinet_addrinet_ntopsocketstd::_
                                                        • String ID: 8.8.8.8
                                                        • API String ID: 2991815363-3817307869
                                                        • Opcode ID: c2ae4e2aa8a317cf68590252c03d98a9c6f3b48ecdf20f8d262c5a68fab716fa
                                                        • Instruction ID: 9c83e06d354758001e61793d555e4b36d4d5d9907fb99cb95bdff13464649eae
                                                        • Opcode Fuzzy Hash: c2ae4e2aa8a317cf68590252c03d98a9c6f3b48ecdf20f8d262c5a68fab716fa
                                                        • Instruction Fuzzy Hash: C4417F72B14B80EAEB10CFB5E4446ED37BAF714BA8F420225CE5927B98DB34C51AD750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule$CurrentProcess
                                                        • String ID: NtCreateSection$RtlNtStatusToDosError$ZwClose$ntdll.dll
                                                        • API String ID: 1077269151-4126113578
                                                        • Opcode ID: d2089462babfbfc65f65bb6324dea4aecb6801d4324b3ef86f1eb5f1e07f0e31
                                                        • Instruction ID: 34ae6f7305abb527cd5b8b5aca80326dc51aaedfea3051503858efe676870bfe
                                                        • Opcode Fuzzy Hash: d2089462babfbfc65f65bb6324dea4aecb6801d4324b3ef86f1eb5f1e07f0e31
                                                        • Instruction Fuzzy Hash: 1C41B676B10B51A9EB10CFA2F8486AD37B8F759B88F160126EE0D93B18DF38C446D350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: LdrGetProcedureAddress$LdrLoadDll$RtlAnsiStringToUnicodeString$RtlFreeUnicodeString$ZwProtectVirtualMemory$kernel32.dll$ntdll.dll
                                                        • API String ID: 4139908857-3936008073
                                                        • Opcode ID: 726f2060fe50d068fdc7436a815b9bcc23a41317b0fb675c7f355f9fb0802a07
                                                        • Instruction ID: 2dc07c7552454182a9897f00983986a5895fcc33b0116b003e7f67324d3b87a7
                                                        • Opcode Fuzzy Hash: 726f2060fe50d068fdc7436a815b9bcc23a41317b0fb675c7f355f9fb0802a07
                                                        • Instruction Fuzzy Hash: FA31A461A15B8078FE91CFC6B84933423ECEBB4790F5755249A6E06352EF7CD481B360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModuleProtectVirtual
                                                        • String ID: SleepEx$UD3"$WriteProcessMemory$kernel32.dll
                                                        • API String ID: 2492872976-2122506030
                                                        • Opcode ID: 3adca6a6eb40ca33ac78abbbaa9f5f44ddec007e8028c110e727a6e9d6522140
                                                        • Instruction ID: 8e8248d47c9fbbdd430bad7734ef9e4abf1fd495ef9d8d571a809b6f6cc2e5bb
                                                        • Opcode Fuzzy Hash: 3adca6a6eb40ca33ac78abbbaa9f5f44ddec007e8028c110e727a6e9d6522140
                                                        • Instruction Fuzzy Hash: CD21B1B6B10B40AAEB10CFA2E8086AD3779F359BD8F410125DE5D17B08DF38C546C790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Handle$CloseExceptionThrow$CreateInformationProcess
                                                        • String ID: CreateProcess failed$Empty Environment
                                                        • API String ID: 4279034346-2749440396
                                                        • Opcode ID: 47022ba870feab8762dd125be17dba9ed1689e8227e944009d4fcf252f15e241
                                                        • Instruction ID: 852e964c07639d05803d36d46d47e8cdae47aea3d53413b2a1fd53b2fb4bf7e5
                                                        • Opcode Fuzzy Hash: 47022ba870feab8762dd125be17dba9ed1689e8227e944009d4fcf252f15e241
                                                        • Instruction Fuzzy Hash: B6E1BF33A00B80A9EB10CFA6E8487AD77B8F7A5B94F624216DBAC57754EF74C481D340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseValue$CreateOpen
                                                        • String ID: SOFTWARE\UnknownDB$size
                                                        • API String ID: 2738932338-2725006514
                                                        • Opcode ID: f37ad5af245a9fbd4f0c2841d37080ec202a735c3d1fd5d1a9e6a6567b779846
                                                        • Instruction ID: 9570c19b720682c6f452da7b1c737e1cbf5cdcd00fa06752c20a88c33f149c95
                                                        • Opcode Fuzzy Hash: f37ad5af245a9fbd4f0c2841d37080ec202a735c3d1fd5d1a9e6a6567b779846
                                                        • Instruction Fuzzy Hash: B551B362710A80A9EF20DFA6D8447ED2BA9F754BE8F650125EE1D87B98DF38C446D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: /ST 04:00 /TR "wscript /nologo $schtasks.exe /F /create /sc minute /mo 4 /TN "
                                                        • API String ID: 1323251999-4088562580
                                                        • Opcode ID: 60821cd9d649be53d51c44833d2c351444a2ba3bf7763e0e731f4f620a153907
                                                        • Instruction ID: bbcc3c1ad8b1dd865a278a2807279f1f294464709cd3d9ca3dceb5ccd5bb53fe
                                                        • Opcode Fuzzy Hash: 60821cd9d649be53d51c44833d2c351444a2ba3bf7763e0e731f4f620a153907
                                                        • Instruction Fuzzy Hash: F8516C72710A80ADFB00CFB6D8481ED377AE7657C8B414116EB6A63BAADF30C515D384
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$CloseCompletionConditionCountCreateCriticalDeallocateHandleInfoInit_thread_footerInitializeMaskPortSectionSpinVerifyVersion__std_exception_copystd::_
                                                        • String ID: iocp$mutex
                                                        • API String ID: 896490569-1266449624
                                                        • Opcode ID: c010a2ec616b73aff491db2663431c0d959f51054d50780293b131bbfb3e82e2
                                                        • Instruction ID: 8e20ced66b5598533b133f611cec71bb28d7fe7da19cb36bb063bfc4e69b2b3f
                                                        • Opcode Fuzzy Hash: c010a2ec616b73aff491db2663431c0d959f51054d50780293b131bbfb3e82e2
                                                        • Instruction Fuzzy Hash: 6741F172301B80AAEF14DFA9E8883A973A8F755B60F5583299B5D437D1EF38D526D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskDeallocateExceptionThrowstd::_$std::bad_alloc::bad_allocstd::invalid_argument::invalid_argument
                                                        • String ID: vector<T> too long
                                                        • API String ID: 766625294-3788999226
                                                        • Opcode ID: 9bb2e9ceaecc9d08049c032bdd5cfe5ebdea079d3173516be4eb89fddc204784
                                                        • Instruction ID: 5040b9d92db418870bcf44b1de59578a610a01ace35a9729a6eca95444e2fbb9
                                                        • Opcode Fuzzy Hash: 9bb2e9ceaecc9d08049c032bdd5cfe5ebdea079d3173516be4eb89fddc204784
                                                        • Instruction Fuzzy Hash: 1861E262711684B6EE20DFA7E44D37966AAE764BD0F224115CFBD07BE5CF38E481A300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$CopyFileFolderPathSpeciallstrcat
                                                        • String ID: .exe
                                                        • API String ID: 956675264-4119554291
                                                        • Opcode ID: cea737a5c3560cd50e02a513239cba0acf317eb2d53bbbcee1ce1bc318ebd73d
                                                        • Instruction ID: 49895b7a50fd8cc461a5b5a888082cf9c2c7987bb88e558966974da7892e962c
                                                        • Opcode Fuzzy Hash: cea737a5c3560cd50e02a513239cba0acf317eb2d53bbbcee1ce1bc318ebd73d
                                                        • Instruction Fuzzy Hash: 6F410472314A40A9EF10CB66E8483AEBB75F395BC8F514125DB4D03AE9CF39C586DB40
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: Enter PreConnect$Failed to connect $Host is active$Leave PreConnect$active_connection if false :
                                                        • API String ID: 1323251999-2787713250
                                                        • Opcode ID: 2dc6a6b313be61b288e0f685bf221c82afd92e9f5219b53c085fd8048c2cac3c
                                                        • Instruction ID: dec65fd5841d1794a1785ed59d21118355186e1d99292d374ab895fd436a1c5b
                                                        • Opcode Fuzzy Hash: 2dc6a6b313be61b288e0f685bf221c82afd92e9f5219b53c085fd8048c2cac3c
                                                        • Instruction Fuzzy Hash: C5419B62710A41A8FF00EBA2E8087FC3769E362B84F465212DE191B3DAEF78C145E310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow
                                                        • String ID: bad cast
                                                        • API String ID: 1824299764-3145022300
                                                        • Opcode ID: 4798a8e7d30c8bb7c778a1dbe6bab799c65b2e68f0a292906d61265ed57fc931
                                                        • Instruction ID: 4f115599f774d4dbba4ec93193d6e0f84e6098650fa3edd2f1f943fbe1763e7d
                                                        • Opcode Fuzzy Hash: 4798a8e7d30c8bb7c778a1dbe6bab799c65b2e68f0a292906d61265ed57fc931
                                                        • Instruction Fuzzy Hash: DE419262760A10AAFF51DBE6D8482BD33ACF7607A4F1A1231DE5D137E5DB38C845A310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow
                                                        • String ID: bad cast
                                                        • API String ID: 1824299764-3145022300
                                                        • Opcode ID: 5e05aef1ebe370ac35ee6bc66840cbd5ac3a6dec5b278f096a06f91e789afb4d
                                                        • Instruction ID: 2ffe97615c95e3eba21dd2fa283cc78a4fd3600cbb101a5855f7e3b90be26191
                                                        • Opcode Fuzzy Hash: 5e05aef1ebe370ac35ee6bc66840cbd5ac3a6dec5b278f096a06f91e789afb4d
                                                        • Instruction Fuzzy Hash: E0419366721A10A9EF11DFE6D8482BD33ACE764BA4F161232DA5D037E5DF38C881E300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow
                                                        • String ID: bad cast
                                                        • API String ID: 1824299764-3145022300
                                                        • Opcode ID: e55b296b51b1a49406912f3423f41d1818cf255f20798f0af81bea34bdc0c0b2
                                                        • Instruction ID: 2851a598f08f4afa91372fd67a11cfdd0a9f11962aaf282ea60bff90a0162d8d
                                                        • Opcode Fuzzy Hash: e55b296b51b1a49406912f3423f41d1818cf255f20798f0af81bea34bdc0c0b2
                                                        • Instruction Fuzzy Hash: 29419F62761A50AAEF11DFA6D8482BC336DE765BA4F1613229E1D537A9DB38C841A300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: @$NtMapViewOfSection$RtlNtStatusToDosError$ntdll.dll
                                                        • API String ID: 667068680-1608534789
                                                        • Opcode ID: 9fd6bcc10a810e17ad7610d687c6c7ed26af0f6ac59edeca4d1013363b507bc9
                                                        • Instruction ID: 68dcaf266c9988215712af19983346fe697d7d0aff7bde58bafe9553de590a45
                                                        • Opcode Fuzzy Hash: 9fd6bcc10a810e17ad7610d687c6c7ed26af0f6ac59edeca4d1013363b507bc9
                                                        • Instruction Fuzzy Hash: 5E117676624B409AEB109B12F84CBA977A8F388BE4F564125DE5C83715DB7DC54ACB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EventWait$CloseHandleMultipleObjectObjectsQueueSingleSleepTerminateThreadUser
                                                        • String ID:
                                                        • API String ID: 499322454-0
                                                        • Opcode ID: 7176941899f37e76fcf79a9e4b018e461708093eb06a4753ec9b4d6ee94773ab
                                                        • Instruction ID: 8d9129fa7c263fd0f472ca2c8e0044ae267aa4a60bfbe5eabdb0bad88864d27f
                                                        • Opcode Fuzzy Hash: 7176941899f37e76fcf79a9e4b018e461708093eb06a4753ec9b4d6ee94773ab
                                                        • Instruction Fuzzy Hash: 8B21BD36620A4092EB108F6AE85832A7374F799FA8F594311DBAE477E4CF3DC856C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DeallocateExceptionThrowstd::_
                                                        • String ID: SELECT * FROM serverinfo$channels
                                                        • API String ID: 1220337477-48552841
                                                        • Opcode ID: 674631c6f81ab3fd7475041a037d412325999a5b3ee0907353b81d48a2a285bc
                                                        • Instruction ID: b7dbf1ffc2d8642515f41a9a84d807592c297bd98fccbf1f1a2fb8cbd0f63e61
                                                        • Opcode Fuzzy Hash: 674631c6f81ab3fd7475041a037d412325999a5b3ee0907353b81d48a2a285bc
                                                        • Instruction Fuzzy Hash: 2CC18D72208BC0A5DA70DB66E8447EBBBA8F791780F519115EBD953BA9CF38C445EB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: sprintf$Deallocatestd::_
                                                        • String ID: in function '$(unknown source location)$:%ld
                                                        • API String ID: 4155924254-763319163
                                                        • Opcode ID: 26b804918a37ce5829ce286cf1798866ed6a7ad2605e9ad207c4c321110f78e2
                                                        • Instruction ID: 35b39caa25c172eecee32d6ae7363cd4b9eb32dbc2d18e78c1818ca86050515b
                                                        • Opcode Fuzzy Hash: 26b804918a37ce5829ce286cf1798866ed6a7ad2605e9ad207c4c321110f78e2
                                                        • Instruction Fuzzy Hash: 6E518E63B247A0ADEF10CBA6D8441EC37BCF322B98F425615DF2923AA9CB34C555D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task$Deallocatestd::_
                                                        • String ID: deque<T> too long
                                                        • API String ID: 4267064421-309773918
                                                        • Opcode ID: a8371790d31e61ca2179988caa23beae1e989b7851626b5beca36ad8092389eb
                                                        • Instruction ID: d1ff7208f003cd6de8ffe4374b36b2f1ebd8677da0855486eeed908d43f27102
                                                        • Opcode Fuzzy Hash: a8371790d31e61ca2179988caa23beae1e989b7851626b5beca36ad8092389eb
                                                        • Instruction Fuzzy Hash: 34411452710680B6EE14DFE6E80C3B9A325E765BE4F164A25AF3D0BBD6CE38C142D340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Value$CompletionDeallocateErrorInit_thread_footerLastPostQueuedStatus__std_exception_copystd::_
                                                        • String ID: pqcs
                                                        • API String ID: 2595774183-2559862021
                                                        • Opcode ID: 67126a693f1b547c11f55c1c97bd62aedbe8987d0e7e89e82c71c6f7f739cb94
                                                        • Instruction ID: 5aaf50f3ab1129e4773f041298d6eeaecaaf1387425498f656586b84bb8dd94f
                                                        • Opcode Fuzzy Hash: 67126a693f1b547c11f55c1c97bd62aedbe8987d0e7e89e82c71c6f7f739cb94
                                                        • Instruction Fuzzy Hash: F8416E72B10B40AEEF10DBA6D8483AC33B9E765B98F0647258A5D53794DF39C94AD340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$FolderPathSpeciallstrcat
                                                        • String ID: .exe
                                                        • API String ID: 2033018779-4119554291
                                                        • Opcode ID: 86f50675cec375b1e420dad1b05f22a17f0365dd77e04f05d47e760de14c97b4
                                                        • Instruction ID: f8a091d5b6de89df107c7db8064e8f16e5df6c77dcecf43a644366e2f0792894
                                                        • Opcode Fuzzy Hash: 86f50675cec375b1e420dad1b05f22a17f0365dd77e04f05d47e760de14c97b4
                                                        • Instruction Fuzzy Hash: 6641F772314A8096EF10CB66E8483AEB769F3947C4F514126EB9E43BA9DF38C545CB40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrowmessages
                                                        • String ID:
                                                        • API String ID: 3662767126-0
                                                        • Opcode ID: 1f150c765907ab37a94505b30b5c99ffad3960d40301666794f5b7568a6fc05a
                                                        • Instruction ID: fe8a6dda13c7ab60ef6f2edcdf225204be6ede0e48c4455c118d1cbb045ae160
                                                        • Opcode Fuzzy Hash: 1f150c765907ab37a94505b30b5c99ffad3960d40301666794f5b7568a6fc05a
                                                        • Instruction Fuzzy Hash: 4A31E9A1624A40A1FE60DBA5E5482BD7379E7B47E4F1A0322DA5D437E5CF3DC852D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exception$Throw$FileHeaderRaise
                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                        • API String ID: 3102897148-1866435925
                                                        • Opcode ID: a872ada0f591cf5e7bd9b635ff7d56a81b1e54baaee857d1449e850a8b39a782
                                                        • Instruction ID: 14994aaadcb04c34e3cf5a0a079ddd82f2a8ddb6b5abd53686c52528e29fb6db
                                                        • Opcode Fuzzy Hash: a872ada0f591cf5e7bd9b635ff7d56a81b1e54baaee857d1449e850a8b39a782
                                                        • Instruction Fuzzy Hash: 2A3153B2B10A11ADFF00DBF5E8492FC2378F76071CF654229DA59269AAEB348546D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: String$AllocFree$Uninitialize
                                                        • String ID: WQL
                                                        • API String ID: 3194604352-1249411209
                                                        • Opcode ID: 5186d0499027583f7b472d7d03f282dcf75d9b96859b3fc5490b072ca91c77a5
                                                        • Instruction ID: 613e820c0e05b48b45d1aea6f7e2022cb4aeb7fce3917505b0b25c5e9709aceb
                                                        • Opcode Fuzzy Hash: 5186d0499027583f7b472d7d03f282dcf75d9b96859b3fc5490b072ca91c77a5
                                                        • Instruction Fuzzy Hash: 0E113A76710B5196EE009F93E848329A7A8F7A8FD0F0A8421DE4D47B64DF3DC9469700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$Handle$Module$Close$CurrentProcess
                                                        • String ID: NtQueueApcThread$ntdll.dll
                                                        • API String ID: 2093435054-3385522575
                                                        • Opcode ID: 7f032f0d48ae3e64864103df712840d2cf7fc0e8f16d6bb5a43478fb4a3f51a2
                                                        • Instruction ID: 120350f6cadcca1c2f9c65de3a0c80e0af28482aef3b1d1778d7302abebe6741
                                                        • Opcode Fuzzy Hash: 7f032f0d48ae3e64864103df712840d2cf7fc0e8f16d6bb5a43478fb4a3f51a2
                                                        • Instruction Fuzzy Hash: 4411E2A6720A40A2EF009B93E91D3BAA725F7A4FD4F458111CE1C477A5CF2CC946C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: NtUnmapViewOfSection$RtlNtStatusToDosError$ntdll.dll
                                                        • API String ID: 667068680-3998908438
                                                        • Opcode ID: e0aa5472596f5f32d49513fb463fc4f582576f06c8c37e8ee9cb00e150da1779
                                                        • Instruction ID: 676cba359842a78321b3f2310f18266286883612195b335632efefb88b622f7b
                                                        • Opcode Fuzzy Hash: e0aa5472596f5f32d49513fb463fc4f582576f06c8c37e8ee9cb00e150da1779
                                                        • Instruction Fuzzy Hash: C5F04965B24A40A5DE009B83F84C0696365B798FC0F495031EE4D47729DE3CC5468700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: NtResumeProcess$RtlNtStatusToDosError$ntdll.dll
                                                        • API String ID: 667068680-1717905385
                                                        • Opcode ID: 11b0c411877281e22652e16a8483be49ccdcc867d6f72d8b07fcf97c78a7b95c
                                                        • Instruction ID: 0c46d82329044f1940831295a37e8acf4c11f0c85413d26576c41be0a7e1fd66
                                                        • Opcode Fuzzy Hash: 11b0c411877281e22652e16a8483be49ccdcc867d6f72d8b07fcf97c78a7b95c
                                                        • Instruction Fuzzy Hash: F7F08C64B24A80A1EE009B93F84C1696775B798FC0F095021DE1E43B29EE7CC546C310
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: b2bd66561fac364b2ae2c1b4f2f42412bc550c34227a761e41759ee0444a93d7
                                                        • Instruction ID: 034340115d6bcbfd782524de1b5bbbda548c102f154e1f26a43b78519c37fa5f
                                                        • Opcode Fuzzy Hash: b2bd66561fac364b2ae2c1b4f2f42412bc550c34227a761e41759ee0444a93d7
                                                        • Instruction Fuzzy Hash: 8D91C6B2B21780A5FE60CBA1944837D76A8B770BA4F168215DD5E276E4DB3CCC43E324
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$closesocket
                                                        • String ID:
                                                        • API String ID: 994200374-0
                                                        • Opcode ID: 0561ed39c85825e9bb87e89ae23672d6bbcd30d4c277c7e54fd37c21627b54c2
                                                        • Instruction ID: 77aa4cf5e3bdf2497c910620a99ca7c600b11293db9ebe04143d4a5d35919e31
                                                        • Opcode Fuzzy Hash: 0561ed39c85825e9bb87e89ae23672d6bbcd30d4c277c7e54fd37c21627b54c2
                                                        • Instruction Fuzzy Hash: B651BD32301E40A5DF11CFA6D4892ADB3A8F366F94F458A11CF99433AAEF38C5A1D344
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$CloseCreateErrorHandleLastModuleNamePointerRead
                                                        • String ID:
                                                        • API String ID: 1442449144-0
                                                        • Opcode ID: 70087b9f50779772a424654cc62f1befcafd84ed2900bc4389a32baa85ad7cc9
                                                        • Instruction ID: 99afc53da891a7b073ec06316124b083c993fb1259f17d47b40104465edef834
                                                        • Opcode Fuzzy Hash: 70087b9f50779772a424654cc62f1befcafd84ed2900bc4389a32baa85ad7cc9
                                                        • Instruction Fuzzy Hash: 3B412872B212927BEEA0DB97A41C7796399F764BD4F2641209E5D03BD0DF3CC805A780
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Lockitstd::_std::locale::_$Locimp::_Lockit::_Lockit::~_Yarn$AddfacGetcvtInitLocimpLocimp_New_Setgloballocale
                                                        • String ID:
                                                        • API String ID: 61045713-0
                                                        • Opcode ID: 4c3028ac7e398b8816de5e83c1fe999bfaeee2871c6fbf99ca2e1ebf952b730d
                                                        • Instruction ID: 0fd3427b3ed8848d76dbb1fb2813cb89c8719f11f9bd98d2af1743e6c8d4a090
                                                        • Opcode Fuzzy Hash: 4c3028ac7e398b8816de5e83c1fe999bfaeee2871c6fbf99ca2e1ebf952b730d
                                                        • Instruction Fuzzy Hash: A431ADB2621B40A6EF40DBA2E8483AC73ADF7A5B90F065225DA5D437A5DFBCC001E350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exception$Throw$FileHeaderRaise__std_exception_copy
                                                        • String ID: Column index out of range.$No row to get a column from. executeStep() was not called, or returned false.$Statement was destroyed
                                                        • API String ID: 2289031373-174481179
                                                        • Opcode ID: 88fcb73628eed5202e7f42a324fee51f7fe743eeb002616fe24686c73a8f5db8
                                                        • Instruction ID: 77a08d0a2b846862f1a83c13e94d10e6e9ebd36499ea1fb923014729bb59d4e2
                                                        • Opcode Fuzzy Hash: 88fcb73628eed5202e7f42a324fee51f7fe743eeb002616fe24686c73a8f5db8
                                                        • Instruction Fuzzy Hash: 1F31AEB2610B40AAEF50CF95E4482A977B8F364BB0F515322E6BC076E5EF38C546D740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$Concurrency::cancel_current_task
                                                        • String ID: vector<T> too long
                                                        • API String ID: 3736559806-3788999226
                                                        • Opcode ID: 0a0be4103b1978126765374103ef4b33d2a043021e5525de07dc89810cefceb0
                                                        • Instruction ID: 8ac9f899270f140735242d6ca1e31bf6e3457bce82108f5b9d3085befbf965ae
                                                        • Opcode Fuzzy Hash: 0a0be4103b1978126765374103ef4b33d2a043021e5525de07dc89810cefceb0
                                                        • Instruction Fuzzy Hash: 8061D466B11A5055EFA0DBAAD608B7D7369E322FF4F164311DB3A07BD9DB35C841A300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __std_exception_copy$CriticalEnterExceptionSectionThrow
                                                        • String ID: Invalid service owner.$Service already exists.
                                                        • API String ID: 3092455130-4115445021
                                                        • Opcode ID: 86ad789e0fd6aec2be38bee938845d304a9da5695a803fd61c6178b9766b7b56
                                                        • Instruction ID: 367548ebc4b30655f625ac6792d47ad30d324cb203daaddf7116b83de7579aa7
                                                        • Opcode Fuzzy Hash: 86ad789e0fd6aec2be38bee938845d304a9da5695a803fd61c6178b9766b7b56
                                                        • Instruction Fuzzy Hash: D9517C32B11B50A9EF50CBA2D8446EC37B8F725758F260226DF4D63BA4EB34C592D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskDeallocateExceptionThrowstd::_std::bad_alloc::bad_alloc
                                                        • String ID: ios_base::eofbit set
                                                        • API String ID: 1457901767-2405381885
                                                        • Opcode ID: a4b39844b71adbc7767de6ab859328425fd0181e19a85b0f0299402ca315afc1
                                                        • Instruction ID: d525149f5bf14ba80cffd9f23fe4da81b8c74b1bea80535333ddc922f8470f2b
                                                        • Opcode Fuzzy Hash: a4b39844b71adbc7767de6ab859328425fd0181e19a85b0f0299402ca315afc1
                                                        • Instruction Fuzzy Hash: 3531B332718B50A4EF288BAAD00837E66A9E325FE4F524631EB69073D9DB74C451A784
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$DeallocateEnterstd::_$CurrentInit_thread_footerLeaveProcess
                                                        • String ID: \\.\pipe\boost_process_auto_pipe_
                                                        • API String ID: 144793568-1684064621
                                                        • Opcode ID: b16f77a33fdc30109715addf748f0b269f37aab1b50396508796ea2602faeed9
                                                        • Instruction ID: 8481cf1f55f2fd9231326ea7bec9bdbfd63c3fa3db8de793f949d7ffcc9f8ce7
                                                        • Opcode Fuzzy Hash: b16f77a33fdc30109715addf748f0b269f37aab1b50396508796ea2602faeed9
                                                        • Instruction Fuzzy Hash: CE41DE72720A50A9FF00CBAAD8083AD23A9E355BA8F121325DE29177E6CF7DC841D740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressHandleLibraryLoadModuleProc
                                                        • String ID: CryptProtectData$crypt32.dll
                                                        • API String ID: 310444273-2924557332
                                                        • Opcode ID: 9c0b4bc447bd5f447888d05fa2d84f75dec9a56fd1a03af58a2373d4b4558085
                                                        • Instruction ID: 5268763a9ffaf05847170e21492b33a7d6a507c653adcc8ba09d868d46f3b7c5
                                                        • Opcode Fuzzy Hash: 9c0b4bc447bd5f447888d05fa2d84f75dec9a56fd1a03af58a2373d4b4558085
                                                        • Instruction Fuzzy Hash: 2C21FAB2B14B00A6EF14CF65E08832E73A5F394B80F41402ADA4E83B54DF38C9A6CB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exceptionstd::_$FileHeaderLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrow__std_exception_copy
                                                        • String ID: bad locale name
                                                        • API String ID: 1909641974-1405518554
                                                        • Opcode ID: fd220552ea68447b8fe0d7988643a14d5efe78e4841a94f98ab2ae03669cf649
                                                        • Instruction ID: 769f984879bfa7bcacb8a75ab700863318626782bc6f83a6d6313af628ceaf9e
                                                        • Opcode Fuzzy Hash: fd220552ea68447b8fe0d7988643a14d5efe78e4841a94f98ab2ae03669cf649
                                                        • Instruction Fuzzy Hash: DB21C072115F8099CB90CF64F88425977B9F7A87A4F244229E7DD83BA9EF38C590C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID: invalid string position
                                                        • API String ID: 118556049-1799206989
                                                        • Opcode ID: b7d51165b27c2500199997ca42b89082d0f54f44b5824a66e2d52bb8224a6c63
                                                        • Instruction ID: 000b9450c39c80b4a3c217ebf393aeb6ba34a25cf78f280e2881b745218d27cc
                                                        • Opcode Fuzzy Hash: b7d51165b27c2500199997ca42b89082d0f54f44b5824a66e2d52bb8224a6c63
                                                        • Instruction Fuzzy Hash: 4CF0C2A531255464ED6CE7E1945D3BA22A8D778770FA20F309B3F0A7C1EE3DA481A701
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ByteCharFormatFreeLocalMessageMultiWide
                                                        • String ID:
                                                        • API String ID: 2906450291-0
                                                        • Opcode ID: 1d2b23c2b42cad0e4b68ae70a886e0294ddc027701faf9ec0a8aa6c164b286db
                                                        • Instruction ID: 1d9078cccd20038bf1ef15ab420ba0b4dc0d356d8147ef8faf5d0f7c7fdc7f63
                                                        • Opcode Fuzzy Hash: 1d2b23c2b42cad0e4b68ae70a886e0294ddc027701faf9ec0a8aa6c164b286db
                                                        • Instruction Fuzzy Hash: 8251DE33724B90A9FF108FA6D8447AE37FAF355B98F514A15EE5A17AA8CB38C140D710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 7586c9cfc4ae4b9dcebee4a1ec3557b899ebc17ff4bc7e9080ca8ea35c4b88d0
                                                        • Instruction ID: 4e784e9442c9dc85f2bb56bfa66345c31f4debe4c0c15db1cea500fa02de5d0e
                                                        • Opcode Fuzzy Hash: 7586c9cfc4ae4b9dcebee4a1ec3557b899ebc17ff4bc7e9080ca8ea35c4b88d0
                                                        • Instruction Fuzzy Hash: 3151DBB2620780A5EF60AF61944837977ACEB75BA0F264325DE6E137E5DB3CC441E360
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 3736559806-0
                                                        • Opcode ID: 15e2d2b5bc711eec4bfe962cf45fe94f84895686142c26674b28f7d0ae7a3191
                                                        • Instruction ID: 9c280a5cb3e7f190c8e951ef29ca6523aee317e9011dbf9550585731d01fcf53
                                                        • Opcode Fuzzy Hash: 15e2d2b5bc711eec4bfe962cf45fe94f84895686142c26674b28f7d0ae7a3191
                                                        • Instruction Fuzzy Hash: 4531E262711B44A6EE64CFA7E8483696268F368BE0F268622DFBD073D4DF79D4459300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 3736559806-0
                                                        • Opcode ID: 463b037edc2dcbe36ce37e6f0b8548f7a509a6b87c2ee5235351eff244e4d616
                                                        • Instruction ID: b3f9ed0ad4d02874d1a4a91faab7163fe6d92e7e15e9b5845671155d6263dda0
                                                        • Opcode Fuzzy Hash: 463b037edc2dcbe36ce37e6f0b8548f7a509a6b87c2ee5235351eff244e4d616
                                                        • Instruction Fuzzy Hash: 29210062B11A90A5EE60DBA6E84C3796268F765BF0F2783319F79037C9DF34C845A300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionThrow
                                                        • String ID: Statement needs to be reseted$exec() does not expect results. Use executeStep.
                                                        • API String ID: 432778473-1345787505
                                                        • Opcode ID: 4f71b60c34c7c9045c5340f61057f7e30ae9e58c79299773b36be9b2c07d2dc5
                                                        • Instruction ID: 26055862da771ea259632b8216285636c875a2c68e2a97391d971acfca0fb02a
                                                        • Opcode Fuzzy Hash: 4f71b60c34c7c9045c5340f61057f7e30ae9e58c79299773b36be9b2c07d2dc5
                                                        • Instruction Fuzzy Hash: DF3106B2214600A5DF70CF55E44827977B8E7A4BA8F664322E2AC476EADF3CC545DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task$Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 4267064421-0
                                                        • Opcode ID: d6bdae19e5daffabb756c2c3ff64b18f1def94cd183c01262e483f929ee4f026
                                                        • Instruction ID: 38bc6c0bff752d0e63d3d5c98bd2293b1fc5c6bd7ce298bf8e915e8b695fd691
                                                        • Opcode Fuzzy Hash: d6bdae19e5daffabb756c2c3ff64b18f1def94cd183c01262e483f929ee4f026
                                                        • Instruction Fuzzy Hash: CB21CC62311A80A5EEA8DFA6E4883ADB368F7557F0F1587269B7D03BC4DF74C0619300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Close$OpenQueryValue
                                                        • String ID:
                                                        • API String ID: 1607946009-0
                                                        • Opcode ID: 3dd8ee0e9e93cd8856ba4965595d66238e7f40e6a33a5eefd3cb574f3246a3c4
                                                        • Instruction ID: 3eca0fdb3a5e5135a7b4de6bd9ff94162a114c6ec6925f10524df200307ce485
                                                        • Opcode Fuzzy Hash: 3dd8ee0e9e93cd8856ba4965595d66238e7f40e6a33a5eefd3cb574f3246a3c4
                                                        • Instruction Fuzzy Hash: AA216972734A8052FF609B52F85C76BA3A4F794B84F415125AE9E47B58DF3CC405DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread32$CloseCreateFirstHandleNextOpenSnapshotThreadToolhelp32
                                                        • String ID:
                                                        • API String ID: 3985273147-0
                                                        • Opcode ID: 93be8e0c88490778be0c92312af6e2efe6eba5c616a11f5a80ae02ce5170ca47
                                                        • Instruction ID: 6781155a53004ec8cd9d2334f417d79a3b9b10709ff0b315a5571d2d1b7cf8d3
                                                        • Opcode Fuzzy Hash: 93be8e0c88490778be0c92312af6e2efe6eba5c616a11f5a80ae02ce5170ca47
                                                        • Instruction Fuzzy Hash: 02015E72604B4096EB20CF66F844269B7E5F398BD8F198125DA9D83B18DF3CC946DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExitThread$ErrorLast$CloseFreeHandleLibrary
                                                        • String ID:
                                                        • API String ID: 3508756349-0
                                                        • Opcode ID: e15ae21a8a18bcc2b930c4a319b40fcc73a9dc491c2968bdd934ce05f2659c28
                                                        • Instruction ID: 171ef8eb7f45fac660b11729ac76212452437a0da66cccb5202ced65b238ebd1
                                                        • Opcode Fuzzy Hash: e15ae21a8a18bcc2b930c4a319b40fcc73a9dc491c2968bdd934ce05f2659c28
                                                        • Instruction Fuzzy Hash: 740184A0B2064072EE199BA1D44C37C667DA760778F111B29823E07FD5DF3CDC599350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DeallocateEnumerateFreeMemoryProcessesstd::_
                                                        • String ID:
                                                        • API String ID: 2429326555-3916222277
                                                        • Opcode ID: 85ba2b6409ce62d508e3f391be98cee882a190c7d40caf25bb7d2bfde22906bc
                                                        • Instruction ID: 1d77e8063e644b1f0b6d6b6f29726dcca5677e70b058e126e29f98b9b9ec1c50
                                                        • Opcode Fuzzy Hash: 85ba2b6409ce62d508e3f391be98cee882a190c7d40caf25bb7d2bfde22906bc
                                                        • Instruction Fuzzy Hash: 0B51AC33700B50A9EF16CFB6D8852AE3778F714BA8F154225DF6A27A98CB35C855E700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: std::_$Deallocate$ByteCharFormatMessageMultiWideWinerror_message
                                                        • String ID: unknown error
                                                        • API String ID: 2107170572-3078798498
                                                        • Opcode ID: 88b32cfccce5052b2f55df36540d0f31b330fe9b5efb206eefcf9fea99a5b008
                                                        • Instruction ID: 14f87546c8ced86f53fc6873fb215dc1887a77f1324ce30ffe997cf625c9ebd8
                                                        • Opcode Fuzzy Hash: 88b32cfccce5052b2f55df36540d0f31b330fe9b5efb206eefcf9fea99a5b008
                                                        • Instruction Fuzzy Hash: 27419A33B20BA0DEEB00CBB5D8841AD3BB9F715798B515218DF1927EA9CB30C452E314
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskExceptionThrowstd::invalid_argument::invalid_argument
                                                        • String ID: vector<T> too long
                                                        • API String ID: 2276022355-3788999226
                                                        • Opcode ID: 5a92d5f79bd58181269240381f31fc661458601ccb65d19c01fdb0e76da80781
                                                        • Instruction ID: ab6a1b940903655f0e806ee286b823c7095a16a46fb129e21419020fd5554571
                                                        • Opcode Fuzzy Hash: 5a92d5f79bd58181269240381f31fc661458601ccb65d19c01fdb0e76da80781
                                                        • Instruction Fuzzy Hash: EB21AE72301B8094DE54DB62E8483A972A8F7A8BB0F2A47259B7D477D4DF79C461D340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$CloseHandle
                                                        • String ID:
                                                        • API String ID: 3705054111-0
                                                        • Opcode ID: 2c37a996d734f629d91e6c84f66c54cfe9d81139f993bae3e97031818cbaa19c
                                                        • Instruction ID: 8346e0d71b20d551b8f37cebb3d17b432034fe7af1c4b5b59addd546a6d21aee
                                                        • Opcode Fuzzy Hash: 2c37a996d734f629d91e6c84f66c54cfe9d81139f993bae3e97031818cbaa19c
                                                        • Instruction Fuzzy Hash: E2310472611B8096DB14CF66D448368B3A8F355FB8F194315DBB947BE4CB78C8A6C340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 1323251999-0
                                                        • Opcode ID: f49c163fa423588da7f9fd3d18ff416694b86adbb217ffe7fbe2fa6e62dc2433
                                                        • Instruction ID: 4c080054032e703e171f508eabf8e2a76b5e8b8bd9c28bb10a5cd98b8700a784
                                                        • Opcode Fuzzy Hash: f49c163fa423588da7f9fd3d18ff416694b86adbb217ffe7fbe2fa6e62dc2433
                                                        • Instruction Fuzzy Hash: 77C17B22B15B84A9EF10CFA2D0487AD23B9F794B84F264626EF5D17B88DF78C545D340
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0000022E65FEEBBB
                                                          • Part of subcall function 0000022E660F3F74: std::bad_alloc::bad_alloc.LIBCMT ref: 0000022E660F3F7D
                                                          • Part of subcall function 0000022E660F3F74: _CxxThrowException.LIBVCRUNTIME ref: 0000022E660F3F8E
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskExceptionThrowstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 1680350287-0
                                                        • Opcode ID: d34af0750bb8bc9719f042571b7f1aa4814627277b0438237578a011b15e10b7
                                                        • Instruction ID: 18578877c6f24d93c8e862be6f2a7ac7fce2c0fd027644aa36ef227cfbb7782f
                                                        • Opcode Fuzzy Hash: d34af0750bb8bc9719f042571b7f1aa4814627277b0438237578a011b15e10b7
                                                        • Instruction Fuzzy Hash: 4C714972301B49A9EF158F6AE05832C37A9F764F98F668516CF2E077A8DB39C845D300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$Getcvt
                                                        • String ID:
                                                        • API String ID: 3195005509-0
                                                        • Opcode ID: 7adaa3d958d29a92fa2c94e6f9395a0f42db61a05c6e577489d62077db8cc84f
                                                        • Instruction ID: efa0e391342e3cb999d47084e62cee2ad8faa65f7472c32068243f1788e7692b
                                                        • Opcode Fuzzy Hash: 7adaa3d958d29a92fa2c94e6f9395a0f42db61a05c6e577489d62077db8cc84f
                                                        • Instruction Fuzzy Hash: 495118B22287C496EBB0CF64D04437D77A8F765B94F0A8326DA8A47B95DB3CD480E750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThread$ErrorFileLastValueWrite
                                                        • String ID:
                                                        • API String ID: 686749581-0
                                                        • Opcode ID: 934b2965bae07f834eaef9839a084c303d522f22f2033665c6e078be66c1c80e
                                                        • Instruction ID: e3c4c89d2a3da12fca5a27d01038890feb8bd1cee090ca0282f22971c81906fd
                                                        • Opcode Fuzzy Hash: 934b2965bae07f834eaef9839a084c303d522f22f2033665c6e078be66c1c80e
                                                        • Instruction Fuzzy Hash: 7A518132700B41AAEB208FB6E9446AD33B8F768BA4F215325DF6953B94DF34D4A1D300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_$FolderPathSpeciallstrcat
                                                        • String ID:
                                                        • API String ID: 2033018779-0
                                                        • Opcode ID: c68129ede5369ce08f79bccd0fc5440d4860236a617001d94200c6921c91ddb0
                                                        • Instruction ID: 1db1d75f51be498d2b915578ecb11f748547ef6aa03bb68a36de928146cdd8dc
                                                        • Opcode Fuzzy Hash: c68129ede5369ce08f79bccd0fc5440d4860236a617001d94200c6921c91ddb0
                                                        • Instruction Fuzzy Hash: E051C373714B80A6DB10CBA6E44459EB7B9F3D5790F514215EBAD43BA9CF38C841DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThread$ErrorFileLastReadValue
                                                        • String ID:
                                                        • API String ID: 979376781-0
                                                        • Opcode ID: 267104820d307a4ddfdc2358ebb8ee6fd51f9385a0f75cf88359fc67cce020d0
                                                        • Instruction ID: 6a3872a8d3d4ca80d66cc54e3688a22456e67c823ec150ce9e4ed6995c8d0d15
                                                        • Opcode Fuzzy Hash: 267104820d307a4ddfdc2358ebb8ee6fd51f9385a0f75cf88359fc67cce020d0
                                                        • Instruction Fuzzy Hash: 1E41A832700B50BAEB249FA2E9446AD3778F328BA8F154315CF6903B94DF35C5A5E340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseHandle$Process$CodeErrorExitInit_thread_footerLastTerminate
                                                        • String ID:
                                                        • API String ID: 946619146-0
                                                        • Opcode ID: 22f9b41419a6b0b5ec3a4d04a61f6470e3dfffa107d8143ce1d17c5bf773d9cc
                                                        • Instruction ID: 8498866ae438c87754b4a1240539fe0d613cf8a73e0b778dc3d646b6f56868e3
                                                        • Opcode Fuzzy Hash: 22f9b41419a6b0b5ec3a4d04a61f6470e3dfffa107d8143ce1d17c5bf773d9cc
                                                        • Instruction Fuzzy Hash: 28318C32704A409AEF209F66D44833C73A4E7A6BB9F165740DBAE032E5CF39C885DB04
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 1323251999-0
                                                        • Opcode ID: 448e2b55cafe125ada8ede9de306a49477015d297b2fc3406885904841c163be
                                                        • Instruction ID: 95e41c1e3b4f8cd1f144a8c5363c078a081e4399427ef001cc7cdf421df10d0e
                                                        • Opcode Fuzzy Hash: 448e2b55cafe125ada8ede9de306a49477015d297b2fc3406885904841c163be
                                                        • Instruction Fuzzy Hash: 77315C73310B4099EF048F6AC2483A93766F31ABD4F445206DB68177EACBB4D2B1D384
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 1323251999-0
                                                        • Opcode ID: 8ef5515b4e3ca16f6176b5b35771366b5af94d6baf4accb1dfc1b5910d6077ca
                                                        • Instruction ID: 385ee32885c3b6f12cf18aeb83b29c5a966179f3a60586359a51bce5f271f0ac
                                                        • Opcode Fuzzy Hash: 8ef5515b4e3ca16f6176b5b35771366b5af94d6baf4accb1dfc1b5910d6077ca
                                                        • Instruction Fuzzy Hash: DD318962310B4099EF048F66C1483BD6766F325B94F099626CB6D1B7EACBB4C1A5D740
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskDeallocatestd::_
                                                        • String ID:
                                                        • API String ID: 4012121645-0
                                                        • Opcode ID: b0d8da76a29f6d8e8d285b19a0cd70461e08551b4907bfaaf8fdce44c3033219
                                                        • Instruction ID: 551d3cb287914267a6f4aa6e7dbab9854c4e6d73f0dfa3a4ae7d4228a641e670
                                                        • Opcode Fuzzy Hash: b0d8da76a29f6d8e8d285b19a0cd70461e08551b4907bfaaf8fdce44c3033219
                                                        • Instruction Fuzzy Hash: 88119D76311A8099EE24CFAAE4483AEB368E7697A0F1543259BED03BD9DF78C0419340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID:
                                                        • API String ID: 1323251999-0
                                                        • Opcode ID: f899393879d5d1f1c25558110d52cd8498eb707fac25ef8fff013d507200782b
                                                        • Instruction ID: 17e3a6f48d04c3a0c3797ce2de6cfcbde193fff6e92fa6fa6d0b8832fa05102b
                                                        • Opcode Fuzzy Hash: f899393879d5d1f1c25558110d52cd8498eb707fac25ef8fff013d507200782b
                                                        • Instruction Fuzzy Hash: 2C215E63304BC088DB218F66E8487EEB76AE356BC8F108116DF9907B1ACB35C191E304
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exception$Throw$FileHeaderRaise__std_exception_copy
                                                        • String ID: Statement was not prepared.$channels_hash
                                                        • API String ID: 2289031373-2674109973
                                                        • Opcode ID: cc515a89af39116f28b5e90d235b0e7ef64b6aa7d1fcb99bee0d0e83cca05615
                                                        • Instruction ID: 2d6ce75d80f8d1b0dae8beb26ec58b6352394919032341168b0b5aa4b04dbae4
                                                        • Opcode Fuzzy Hash: cc515a89af39116f28b5e90d235b0e7ef64b6aa7d1fcb99bee0d0e83cca05615
                                                        • Instruction Fuzzy Hash: A121C2B1624640A2DF60CF95E8482BAB764EBA07B0F511321B6BE465EADF3CC045DB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ConditionMask$InfoVerifyVersion
                                                        • String ID:
                                                        • API String ID: 2793162063-0
                                                        • Opcode ID: ed517d1c89aaf24c3d38c1ea0b443ae0b58a417ed588da2f2be5e6e45499a0e1
                                                        • Instruction ID: d3386074dd99f07cace58c94209b555f9f5bd6cb2b9614e11a0aa75773b8aaf0
                                                        • Opcode Fuzzy Hash: ed517d1c89aaf24c3d38c1ea0b443ae0b58a417ed588da2f2be5e6e45499a0e1
                                                        • Instruction Fuzzy Hash: 7C114C7251578096EA34CF62F8443EAB3A4F78CB44F414225EB8E47B58DB3CD606DB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$abort
                                                        • String ID:
                                                        • API String ID: 1447195878-0
                                                        • Opcode ID: 00411179ad6fac4d56f9e037d918aea51f230ba50e64b4a2e5b3754ed19e40fa
                                                        • Instruction ID: ce655baa606aa88b486136b4bf75c4a0fc6ce27b9c288c585b67806f908606a9
                                                        • Opcode Fuzzy Hash: 00411179ad6fac4d56f9e037d918aea51f230ba50e64b4a2e5b3754ed19e40fa
                                                        • Instruction Fuzzy Hash: D8015EE0B3174167FF5867F2A55D37E21AD9B64780F060528A91E07BD6ED2CC8C16320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task$ExceptionThrowstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 2386360001-0
                                                        • Opcode ID: 64d5bc389b5e37fc960923369a40d85aadef4152f469a040f7cee82ad72a139b
                                                        • Instruction ID: adb08a1e4254e8e6281da3e69b79bdd2623e7e79c91460dfb012cf629a9c0cf6
                                                        • Opcode Fuzzy Hash: 64d5bc389b5e37fc960923369a40d85aadef4152f469a040f7cee82ad72a139b
                                                        • Instruction Fuzzy Hash: 8AF030507266447CFDACE2FA546E77B615C87B4BB6F531F30BB3E027D2EA2984416A00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: map/set<T> too long
                                                        • API String ID: 1323251999-1285458680
                                                        • Opcode ID: ac8a71247d372f009445a94f35bb3340ad4d9868760bc952dea1f5f91629738d
                                                        • Instruction ID: 71f5cf8781bd5c1cb121e7b79bdd6dccfaeb9b194e3519c02daf1de9dd2e0fdb
                                                        • Opcode Fuzzy Hash: ac8a71247d372f009445a94f35bb3340ad4d9868760bc952dea1f5f91629738d
                                                        • Instruction Fuzzy Hash: 13A1F872305B88D4DF54CF5AD48822CB7A9F3A5F88B66C615CB9C473A5DB72C8A1D380
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: *
                                                        • API String ID: 3215553584-163128923
                                                        • Opcode ID: d27e2628b12ae6239cd04aaaaa6be6c1cddb7cb5e1b3272398801f44e9903c2b
                                                        • Instruction ID: 69094f39b13d5400504d4992f0f66c899b13c20cf124b05ef350cb3fd419b056
                                                        • Opcode Fuzzy Hash: d27e2628b12ae6239cd04aaaaa6be6c1cddb7cb5e1b3272398801f44e9903c2b
                                                        • Instruction Fuzzy Hash: E18175F692065097EF698F65805C23CBFB8F325F48F26111ADB0E42298D739CC89E761
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: :%d$std:
                                                        • API String ID: 1323251999-2791438976
                                                        • Opcode ID: 230f99e8dbca8509400028c7a52ffecfa0f97af031d665380dc316a808301170
                                                        • Instruction ID: d37ef06e37f20f07f288026fd841ddb1087be189f1bff4290c0d02e6da7590da
                                                        • Opcode Fuzzy Hash: 230f99e8dbca8509400028c7a52ffecfa0f97af031d665380dc316a808301170
                                                        • Instruction Fuzzy Hash: CE619163710790AAEF10CBB6D8442EC3BB8F722BA8F555619CF6927BA9CB34C511D310
                                                        APIs
                                                          • Part of subcall function 0000022E65FF5E20: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5EC2
                                                          • Part of subcall function 0000022E65FF5E20: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5EFD
                                                          • Part of subcall function 0000022E65FF6050: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF60B4
                                                          • Part of subcall function 0000022E65FF6050: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF6123
                                                        • std::_Deallocate.LIBCONCRT ref: 0000022E65FECCC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionThrow$Deallocatestd::_
                                                        • String ID: SELECT * FROM serverinfo$channels_hash
                                                        • API String ID: 3765642668-1575216166
                                                        • Opcode ID: 4e4f18a0f930c5979e3b7ec6fb7c403b2075f8937bdb12412208826e2eecd391
                                                        • Instruction ID: 8dad9b165216a84afd196b1766e96dbb7d4a5c91afebd2e9ca1a2d6bc84827b4
                                                        • Opcode Fuzzy Hash: 4e4f18a0f930c5979e3b7ec6fb7c403b2075f8937bdb12412208826e2eecd391
                                                        • Instruction Fuzzy Hash: A261F522314AC0A9EF609F56E4483AE67A4F3A1B90F555221EBAE53B95CF3CC444DB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: %02x
                                                        • API String ID: 3215553584-560843007
                                                        • Opcode ID: 8c3b55c9941bb200c853d7375962b284c8d710a8b6bc53abf22da6628e2d66ac
                                                        • Instruction ID: 4cbeea79d5acee8e7f3169637501283807f1b15129589750fe43cb65e7aa6973
                                                        • Opcode Fuzzy Hash: 8c3b55c9941bb200c853d7375962b284c8d710a8b6bc53abf22da6628e2d66ac
                                                        • Instruction Fuzzy Hash: 6E51A5F29246409AEF648FA4C06C37CBBF9F325B58F161915CAAA41299C72DCC81F725
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
                                                        • String ID: ios_base::eofbit set
                                                        • API String ID: 3561508498-2405381885
                                                        • Opcode ID: 1e2eef473c856727ca323241a9cd124ef27d85607caf739c7e2944a5cba9e514
                                                        • Instruction ID: e14e69d9029509ac7d08a681844f2c9da393e0baa82c9b71a2a371b27fc12bbc
                                                        • Opcode Fuzzy Hash: 1e2eef473c856727ca323241a9cd124ef27d85607caf739c7e2944a5cba9e514
                                                        • Instruction Fuzzy Hash: 6251F7F2A302006AFFA4CFA5E9893BE3AE4F374354F42642DDD0987A96C77C85509B10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: at
                                                        • API String ID: 1323251999-3093187855
                                                        • Opcode ID: 3b443643fa4f95bc16a56912a063915ccc46b9b039a654e28d1d4fac87ed4df4
                                                        • Instruction ID: fefd056d121f8b6f4aa2d01f8c1681f305f4df4d8706c9f2669d486eac1fbd76
                                                        • Opcode Fuzzy Hash: 3b443643fa4f95bc16a56912a063915ccc46b9b039a654e28d1d4fac87ed4df4
                                                        • Instruction Fuzzy Hash: 8A318062720650A8FF009BA6D8083AD2679F756BE8F456320DF3917AD6CF79C1009704
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CompletionCreateErrorInit_thread_footerLastPort
                                                        • String ID: assign
                                                        • API String ID: 559391843-1914874273
                                                        • Opcode ID: 593cac7035701f23012c518991db8277ce13db33d040785137ddabf58c11eb63
                                                        • Instruction ID: b40128a4b7c19d3fc38e612cc40a38ccfad4518f2d8dabef90e1211d4bb0ad2b
                                                        • Opcode Fuzzy Hash: 593cac7035701f23012c518991db8277ce13db33d040785137ddabf58c11eb63
                                                        • Instruction Fuzzy Hash: BF315932B10F6099EB40CBB5E8452AD37B8F729798F059715DF8827A89EF34C191D300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: " WHERE key='channels'$UPDATE serverinfo SET value="
                                                        • API String ID: 1323251999-2643526983
                                                        • Opcode ID: 0efb5280d855707d35698efb959b4db4528dc0fe23f59be7926e335717638585
                                                        • Instruction ID: 4991bc86d0b2f627f660b3f5104e0fe717a3eeba0fdeb653bd3f7a38a7a0e28b
                                                        • Opcode Fuzzy Hash: 0efb5280d855707d35698efb959b4db4528dc0fe23f59be7926e335717638585
                                                        • Instruction Fuzzy Hash: 4D212562328A40A5FF008B2AD0483BE6B65F3A2BA4F616310E775077D6CF7EC084DB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Deallocatestd::_
                                                        • String ID: " WHERE key='channels_hash'$UPDATE serverinfo SET value="
                                                        • API String ID: 1323251999-3826795247
                                                        • Opcode ID: ff1909b77fdac0da13a733e15060ff5e8ff774f55b775bf702affc4b917d6f56
                                                        • Instruction ID: 5842adcfa5218a5554a0d48aaf1749f816623420d8e749a153b22d0d9c91b755
                                                        • Opcode Fuzzy Hash: ff1909b77fdac0da13a733e15060ff5e8ff774f55b775bf702affc4b917d6f56
                                                        • Instruction Fuzzy Hash: 7A210322328A40A9FF008B1AD04C3BE6B65F3A2BA4F615310E775076DACF79C485DB40
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ACP$OCP
                                                        • API String ID: 0-711371036
                                                        • Opcode ID: d65709d502787347c32c6ecbb2c6a0bb65157b947c2a4920554ba3b85816e9f6
                                                        • Instruction ID: 3813f4bb613359fd36b2f40ab60e25433ddc08aa32755d8644b3003bb5dda2d4
                                                        • Opcode Fuzzy Hash: d65709d502787347c32c6ecbb2c6a0bb65157b947c2a4920554ba3b85816e9f6
                                                        • Instruction Fuzzy Hash: 41115BA1B30781B2FF94D7E1E5497BA7358AB74788F410011EA4FA31A5DB2CC841E360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CompletionDeallocateErrorInit_thread_footerLastPostQueuedStatus__std_exception_copystd::_
                                                        • String ID: pqcs
                                                        • API String ID: 2774852394-2559862021
                                                        • Opcode ID: e3492e10febf3ddcead5f9aa4df7940327e0caae7cc55a6af79b8d364ea46598
                                                        • Instruction ID: b8545b716e55ad490a9fd9abff5d70b5e43d3b596dd7f30ff10408577c7c0743
                                                        • Opcode Fuzzy Hash: e3492e10febf3ddcead5f9aa4df7940327e0caae7cc55a6af79b8d364ea46598
                                                        • Instruction Fuzzy Hash: 5701DB63B146415AEF6097BED8593396264E7F2778F215321977E872E0DF25C817CB00
                                                        APIs
                                                          • Part of subcall function 0000022E65FF5F20: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5FA7
                                                          • Part of subcall function 0000022E65FF5F20: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5FFC
                                                          • Part of subcall function 0000022E65FF5F20: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF6037
                                                          • Part of subcall function 0000022E65FED1F4: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5DD7
                                                          • Part of subcall function 0000022E65FED1F4: _CxxThrowException.LIBVCRUNTIME ref: 0000022E65FF5E0F
                                                          • Part of subcall function 0000022E65FEC0D0: std::_Deallocate.LIBCONCRT ref: 0000022E65FEC12B
                                                          • Part of subcall function 0000022E65FEC0D0: std::_Deallocate.LIBCONCRT ref: 0000022E65FEC17C
                                                        • std::_Deallocate.LIBCONCRT ref: 0000022E65FEC319
                                                        • std::_Deallocate.LIBCONCRT ref: 0000022E65FEC345
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionThrow$Deallocatestd::_
                                                        • String ID: INSERT INTO serverinfo VALUES (?, NULL)
                                                        • API String ID: 3765642668-945103988
                                                        • Opcode ID: 8efafe475aa132f993af1a95ca24dd936d19c17f6ca64a56cb237dcd80d394d1
                                                        • Instruction ID: 12321c5aee6e6b3ad94304093c1e34625e629b12aac552b4f18d528e15e47fcb
                                                        • Opcode Fuzzy Hash: 8efafe475aa132f993af1a95ca24dd936d19c17f6ca64a56cb237dcd80d394d1
                                                        • Instruction Fuzzy Hash: F5119B62318580B5EE10DB55E4442EEA718F7E5780F915012F7AD83FAADB29C941DF00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocErrorInit_thread_footerLast
                                                        • String ID: tss
                                                        • API String ID: 1086260276-1638339373
                                                        • Opcode ID: 8f9e7136197db633b5f4265ace896fa666562d166ba8fc6613dc730da491a0f5
                                                        • Instruction ID: 626830f837c542e13c70fdeccc731033d1627df6eed0658777a84b4a2661b1e9
                                                        • Opcode Fuzzy Hash: 8f9e7136197db633b5f4265ace896fa666562d166ba8fc6613dc730da491a0f5
                                                        • Instruction Fuzzy Hash: F911C472A14B8096DB608B96B44822EB3B8F7A47B0F164325EAAE877D4DF3CC455D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocErrorInit_thread_footerLast
                                                        • String ID: tss
                                                        • API String ID: 1086260276-1638339373
                                                        • Opcode ID: 6c0bab18e97e6e242f506272a8f334a17637a292bca1145f9cfbffc087ac02a3
                                                        • Instruction ID: bfb8bb72ba593112396f0985cdb9544469f18153a616210c5a2a5a9a35be9d4a
                                                        • Opcode Fuzzy Hash: 6c0bab18e97e6e242f506272a8f334a17637a292bca1145f9cfbffc087ac02a3
                                                        • Instruction Fuzzy Hash: DA11A772A18B8096DB509BA6F44822EB3B8F7947B0F154325EA9E877D8DF7CC445D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocErrorInit_thread_footerLast
                                                        • String ID: tss
                                                        • API String ID: 1086260276-1638339373
                                                        • Opcode ID: 49c328d6a76975803143d1a3ff2a4e3df8e1512095aa24e68517796a5146f870
                                                        • Instruction ID: aa72c5f482ba711ea19ae15aebd82b65e4c81768029e1d7f706e656773a3947c
                                                        • Opcode Fuzzy Hash: 49c328d6a76975803143d1a3ff2a4e3df8e1512095aa24e68517796a5146f870
                                                        • Instruction Fuzzy Hash: 0911C472A14B8096DB609B96B44822EB3B8F7987B0F054321EB9E877D4EF3CC445D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CompletionDeallocateErrorInit_thread_footerLastPostQueuedStatus__std_exception_copystd::_
                                                        • String ID: pqcs
                                                        • API String ID: 2774852394-2559862021
                                                        • Opcode ID: e08c1fd89f315d01e51fe32e1eebff560f3a7b1aaf15f8b23e3f497d1b5d90e7
                                                        • Instruction ID: 0b03f63d87b7efe4e43fb4e49a399ae3fa12937e41ea3033213b43091151b28d
                                                        • Opcode Fuzzy Hash: e08c1fd89f315d01e51fe32e1eebff560f3a7b1aaf15f8b23e3f497d1b5d90e7
                                                        • Instruction Fuzzy Hash: BC01F762B006016AEFA197FA98597692264E7B67B4F226311D62D832E1EF25C907D700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionThrow__std_exception_copy
                                                        • String ID: Plaintext length must be divisible by
                                                        • API String ID: 1552479455-1679265635
                                                        • Opcode ID: 4e3dee2babd7a04a632c232a0d6e571bc77ded9b2bcf010085783eec98cffdc4
                                                        • Instruction ID: 2bfed6dc9c381eb3e7a7b57e2f090ea180af606954d932ac359498828aa0a598
                                                        • Opcode Fuzzy Hash: 4e3dee2babd7a04a632c232a0d6e571bc77ded9b2bcf010085783eec98cffdc4
                                                        • Instruction Fuzzy Hash: F6117072628B81A1EF20CB54F4883AAB768F3A5354F510225B2DD83AF9DF3CC645D710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressCloseHandleProc
                                                        • String ID: AdjustTokenPrivileges
                                                        • API String ID: 1969799054-233039311
                                                        • Opcode ID: 74ccd240bff611db08523fc19544953063ccf4100b545113b3f9ab49f544c999
                                                        • Instruction ID: fbef272a3ebb6ea0e21a9affd11ea65c09129c5d1e7f3be82e0df3e624cd68f1
                                                        • Opcode Fuzzy Hash: 74ccd240bff611db08523fc19544953063ccf4100b545113b3f9ab49f544c999
                                                        • Instruction Fuzzy Hash: 02F03A72728B4096DB508F86F88475AF3A5F7C8B94F041015EA9E83B69DFBCC5458B00
                                                        APIs
                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0000022E660CF188
                                                          • Part of subcall function 0000022E660CF0EC: __std_exception_copy.LIBVCRUNTIME ref: 0000022E660CF11E
                                                        • _CxxThrowException.LIBVCRUNTIME ref: 0000022E660CF199
                                                          • Part of subcall function 0000022E66114DA0: RtlPcToFileHeader.KERNEL32 ref: 0000022E66114E1D
                                                          • Part of subcall function 0000022E66114DA0: RaiseException.KERNEL32 ref: 0000022E66114E5C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Exception$FileHeaderRaiseThrow__std_exception_copystd::invalid_argument::invalid_argument
                                                        • String ID: bad function call
                                                        • API String ID: 1897909357-3612616537
                                                        • Opcode ID: 6d2eb04cb2dc6af71bd1b3b8d03db339e6ef23591d3f27a82a33139da0af2a3b
                                                        • Instruction ID: 411c0e2fc39d0e8b2b758ff001b8d165cf4af93f95d885dde684a7c793fce452
                                                        • Opcode Fuzzy Hash: 6d2eb04cb2dc6af71bd1b3b8d03db339e6ef23591d3f27a82a33139da0af2a3b
                                                        • Instruction Fuzzy Hash: AFD023D1730540B1DD30D780E44C2E8633DFBF0344FD14411914C47975DA2CC609D301
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.4171458964.0000022E65FC0000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000022E65FC0000, based on PE: true
                                                        • Associated: 00000003.00000002.4171458964.0000022E661DB000.00000040.10000000.00040000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_22e65fc0000_rundll32.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 637b46d9d8bd5ee121bf3d9b21d41341a45bb9cad426556bd981ae4efd046239
                                                        • Instruction ID: 8188805682363f17c96cb658dbc48b753f74559422943cf67830193179702d17
                                                        • Opcode Fuzzy Hash: 637b46d9d8bd5ee121bf3d9b21d41341a45bb9cad426556bd981ae4efd046239
                                                        • Instruction Fuzzy Hash: B1419D62711B4496EFA48F93961836963A9FBA6FD0F0A4624CF4D03B80DF38D451D300