Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PDFonlineseguro.exe

Overview

General Information

Sample name:PDFonlineseguro.exe
Analysis ID:1587432
MD5:fddcc6db43b7aea103c315249bc12bbe
SHA1:97f3ce1e1008deef73aed1d4f58bf184146ad243
SHA256:bf836b14f236cce4cecd3b261b4e9b3f2f159ac9661cc2bf351e3533a7e8e5eb
Tags:exeuser-zhuzhu0009
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected AntiVM3
AI detected suspicious sample
Allocates memory in foreign processes
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
May modify the system service descriptor table (often done to hook functions)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query CPU information (cpuid)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PDFonlineseguro.exe (PID: 6328 cmdline: "C:\Users\user\Desktop\PDFonlineseguro.exe" MD5: FDDCC6DB43B7AEA103C315249BC12BBE)
    • csc.exe (PID: 1912 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.2514402981.0000000007FD3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000009.00000002.2513804925.0000000006B60000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: csc.exe PID: 1912JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Process Memory Space: csc.exe PID: 1912JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            SourceRuleDescriptionAuthorStrings
            9.2.csc.exe.8059828.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              9.2.csc.exe.6b60000.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\PDFonlineseguro.exe, ProcessId: 6328, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NordicVPN
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                Compliance

                barindex
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeUnpacked PE file: 0.2.PDFonlineseguro.exe.400000.0.unpack
                Source: PDFonlineseguro.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: D:\ActiveClean\src\user\TMCOMMENG\Release\tmcomeng.pdbPMZ source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\tmavsetup\Release\TmEngDrv.pdbP source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\RootkitScanner\Release\RootkitBuster.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\tmavsetup\Release\TmEngDrv.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\TMCOMMENG\Release\tmcomeng.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: d:\activeclean\src\sys\output\fre_wxp_x86\i386\tmcomm.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00406A80 FindFirstFileW,FindClose,0_2_00406A80
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00405570 SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetLastError,GetLastError,GetLastError,FindClose,0_2_00405570
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 4x nop then push esi0_2_0040A4B0
                Source: global trafficTCP traffic: 192.168.2.7:49799 -> 181.71.216.203:30203
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: newstaticfreepoint24.ddns-ip.net
                Source: csc.exe, 00000009.00000002.2513943972.000000000708A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                System Summary

                barindex
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeFile dump: RemotePCPrinter.exe.0.dr 959667331Jump to dropped file
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00407070 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00407070
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412EE70_2_00412EE7
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041C0540_2_0041C054
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041C00B0_2_0041C00B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041303C0_2_0041303C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041A0DC0_2_0041A0DC
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004120B20_2_004120B2
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004260B60_2_004260B6
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041694D0_2_0041694D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004129050_2_00412905
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041290D0_2_0041290D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041B9DC0_2_0041B9DC
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041A1E40_2_0041A1E4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004159F10_2_004159F1
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041AA4B0_2_0041AA4B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041425D0_2_0041425D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041C26C0_2_0041C26C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00414A080_2_00414A08
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412A0D0_2_00412A0D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412A360_2_00412A36
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412AE30_2_00412AE3
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412AB50_2_00412AB5
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00416B480_2_00416B48
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412B560_2_00412B56
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00416B5B0_2_00416B5B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00416B0B0_2_00416B0B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041B3140_2_0041B314
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041E3160_2_0041E316
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412B270_2_00412B27
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00416B350_2_00416B35
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00426B340_2_00426B34
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004133D40_2_004133D4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412BBC0_2_00412BBC
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412C5E0_2_00412C5E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00415C770_2_00415C77
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412CD60_2_00412CD6
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00415CDC0_2_00415CDC
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004144E20_2_004144E2
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004134E50_2_004134E5
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004134890_2_00413489
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041E4920_2_0041E492
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00415D410_2_00415D41
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412D4D0_2_00412D4D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041B54D0_2_0041B54D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00415D530_2_00415D53
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004125630_2_00412563
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041AD6D0_2_0041AD6D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00415D320_2_00415D32
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00425DCF0_2_00425DCF
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412D960_2_00412D96
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00413D9B0_2_00413D9B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00419E630_2_00419E63
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00419E6E0_2_00419E6E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412E000_2_00412E00
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041BE240_2_0041BE24
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004136290_2_00413629
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004136A80_2_004136A8
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00419F470_2_00419F47
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412F5B0_2_00412F5B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412F680_2_00412F68
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00420F6C0_2_00420F6C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00412F2D0_2_00412F2D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0041BFF90_2_0041BFF9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008FCA850_2_008FCA85
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00908DD90_2_00908DD9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090F0D50_2_0090F0D5
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090C0440_2_0090C044
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090984B0_2_0090984B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009099920_2_00909992
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F596E0_2_008F596E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F726C0_2_008F726C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090C3310_2_0090C331
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F232A0_2_008F232A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F8B470_2_008F8B47
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00908B580_2_00908B58
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F736F0_2_008F736F
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F24090_2_008F2409
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008FC42C0_2_008FC42C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090E4230_2_0090E423
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090A4440_2_0090A444
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F64650_2_008F6465
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090EC7B0_2_0090EC7B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090959F0_2_0090959F
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F6D9D0_2_008F6D9D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090ADCA0_2_0090ADCA
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F6D030_2_008F6D03
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00908D060_2_00908D06
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F6D280_2_008F6D28
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008FB5220_2_008FB522
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090C5210_2_0090C521
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008F6D660_2_008F6D66
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0090C63A0_2_0090C63A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_008FCFD70_2_008FCFD7
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00909F4D0_2_00909F4D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E0120_2_0092E012
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093341D0_2_0093341D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092C45E0_2_0092C45E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D0BE0_2_0092D0BE
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092F0A40_2_0092F0A4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D8AE0_2_0092D8AE
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009320F10_2_009320F1
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009330F40_2_009330F4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009330E00_2_009330E0
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009200EA0_2_009200EA
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092001F0_2_0092001F
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092002C0_2_0092002C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E05B0_2_0092E05B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E0440_2_0092E044
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093407E0_2_0093407E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D1B40_2_0092D1B4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009341AB0_2_009341AB
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D1AB0_2_0092D1AB
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009249D90_2_009249D9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009349C80_2_009349C8
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009341F20_2_009341F2
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E9FA0_2_0092E9FA
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009249FD0_2_009249FD
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009321E80_2_009321E8
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E1310_2_0092E131
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093413A0_2_0093413A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D9210_2_0092D921
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D1290_2_0092D129
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E1500_2_0092E150
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D1580_2_0092D158
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092494C0_2_0092494C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D1730_2_0092D173
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092496A0_2_0092496A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D96C0_2_0092D96C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009322920_2_00932292
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009342A40_2_009342A4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DAD70_2_0092DAD7
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009322F60_2_009322F6
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00924A370_2_00924A37
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DA340_2_0092DA34
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092925E0_2_0092925E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093224C0_2_0093224C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DA710_2_0092DA71
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DA7B0_2_0092DA7B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00924B830_2_00924B83
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D38C0_2_0092D38C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009243B00_2_009243B0
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933BA30_2_00933BA3
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933BD90_2_00933BD9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009273CB0_2_009273CB
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DBCC0_2_0092DBCC
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092FBE50_2_0092FBE5
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009313160_2_00931316
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009343080_2_00934308
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D30C0_2_0092D30C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D3330_2_0092D333
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009313550_2_00931355
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009313450_2_00931345
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DB4D0_2_0092DB4D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009343720_2_00934372
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00931B750_2_00931B75
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934B7B0_2_00934B7B
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DB660_2_0092DB66
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093336D0_2_0093336D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934B6C0_2_00934B6C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00924C960_2_00924C96
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934C9A0_2_00934C9A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DCD20_2_0092DCD2
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E4F30_2_0092E4F3
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934CF10_2_00934CF1
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934CFE0_2_00934CFE
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934CE90_2_00934CE9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D40E0_2_0092D40E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933C2A0_2_00933C2A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934C530_2_00934C53
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D4560_2_0092D456
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934C710_2_00934C71
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933D800_2_00933D80
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D5860_2_0092D586
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934DA70_2_00934DA7
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092CDAD0_2_0092CDAD
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DDC70_2_0092DDC7
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934DC60_2_00934DC6
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092EDFE0_2_0092EDFE
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934DE30_2_00934DE3
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009335E90_2_009335E9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D5130_2_0092D513
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D50C0_2_0092D50C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092CD740_2_0092CD74
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D5640_2_0092D564
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934D6A0_2_00934D6A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009326970_2_00932697
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093369D0_2_0093369D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933E830_2_00933E83
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00934E8D0_2_00934E8D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DEDA0_2_0092DEDA
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009336F40_2_009336F4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D6FF0_2_0092D6FF
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DE020_2_0092DE02
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092CE030_2_0092CE03
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933E000_2_00933E00
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DE070_2_0092DE07
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092FE3E0_2_0092FE3E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092CE530_2_0092CE53
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093365A0_2_0093365A
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00928E580_2_00928E58
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DE760_2_0092DE76
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093367E0_2_0093367E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092767D0_2_0092767D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00933E7C0_2_00933E7C
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009337A10_2_009337A1
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092D7D40_2_0092D7D4
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009327140_2_00932714
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009347390_2_00934739
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_009327380_2_00932738
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092DF2D0_2_0092DF2D
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0092E7520_2_0092E752
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093476E0_2_0093476E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0093376C0_2_0093376C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_050F30289_2_050F3028
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_050F30389_2_050F3038
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A446509_2_06A44650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4C1809_2_06A4C180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A44D689_2_06A44D68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A446409_2_06A44640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A447969_2_06A44796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4C4A79_2_06A4C4A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4D1B09_2_06A4D1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A43CF19_2_06A43CF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A43D009_2_06A43D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_094DDDD89_2_094DDDD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_094DC4589_2_094DC458
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_094DDDC99_2_094DDDC9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A11609_2_096A1160
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A05489_2_096A0548
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A5D909_2_096A5D90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A2EF89_2_096A2EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A61459_2_096A6145
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A08909_2_096A0890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A2EE99_2_096A2EE9
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: String function: 0041E430 appears 66 times
                Source: PDFonlineseguro.exeStatic PE information: Resource name: DRIVER type: PE32 executable (native) Intel 80386, for MS Windows
                Source: PDFonlineseguro.exeStatic PE information: Resource name: TMCOMMDLL type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Source: PDFonlineseguro.exeStatic PE information: Resource name: TMENGDRV type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Source: PDFonlineseguro.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: RemotePCPrinter.exe.0.drStatic PE information: Resource name: DRIVER type: PE32 executable (native) Intel 80386, for MS Windows
                Source: RemotePCPrinter.exe.0.drStatic PE information: Resource name: TMCOMMDLL type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Source: RemotePCPrinter.exe.0.drStatic PE information: Resource name: TMENGDRV type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Source: RemotePCPrinter.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: PDFonlineseguro.exeBinary or memory string: %sOriginalFileName vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000000.1248008280.000000000045C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTmComm.sysN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000002.1522101624.0000000002A89000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRootkitBuster.exeN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000000.1248008280.000000000055E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRootkitBuster.exeN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000000.1248008280.000000000049F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametmcomeng.dllN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000002.1522101624.0000000002930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: %sOriginalFileName vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000002.1522101624.0000000002930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OD.H%sSpecialBuild%sPrivateBuild%sLegalTrademarks%sComments%sProductVersion%sProductName%sOriginalFileName%sLegalCopyright%sInternalName%sFileVersion%sFileDescription%sCompanyName\StringFileInfo\%04X%04X\\VarFileInfo\Translation\Leaving destruct CSICReportLogger objectD:\ActiveClean\src\user\RootkitScanner\source\SICReportLogger.cppCSICReportLogger::~CSICReportLogger()Entering destruct CSICReportLogger objectLog File Handle not Initialized.CSIC::LogString()No memory space can be allocated.CSIC::LogSingleString()leaving Initialize CSIC scan object ret=%d%s%s\%s\%sSICLOGCSICReportLogger::Initialize()Entering Initialize CSICReportLogger objectCSICReportLogger::LogBytes()CSICReportLogger::_CloseLogFileCloseLogFile\%%s%%.%dd.%%sCan't find next file, ErrNo=%d%s*.%sTXTCSICReportLogger::RotateFileName()X86PROCESSOR_ARCHITEW6432PROCESSOR_ARCHITECTUREAfter uninstall driver=%dD:\ActiveClean\src\user\RootkitScanner\source\TMRKScanWin.cpp(Needn't waiting)bStopped=%dWinAppDestructor()(After waiting)bStopped=%d+----------------------------------------------------+ vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000002.1522101624.0000000002984000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTmComm.sysN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000000.1247954319.000000000044E000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: %sOriginalFileName vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exe, 00000000.00000000.1247954319.000000000044E000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OD.H%sSpecialBuild%sPrivateBuild%sLegalTrademarks%sComments%sProductVersion%sProductName%sOriginalFileName%sLegalCopyright%sInternalName%sFileVersion%sFileDescription%sCompanyName\StringFileInfo\%04X%04X\\VarFileInfo\Translation\Leaving destruct CSICReportLogger objectD:\ActiveClean\src\user\RootkitScanner\source\SICReportLogger.cppCSICReportLogger::~CSICReportLogger()Entering destruct CSICReportLogger objectLog File Handle not Initialized.CSIC::LogString()No memory space can be allocated.CSIC::LogSingleString()leaving Initialize CSIC scan object ret=%d%s%s\%s\%sSICLOGCSICReportLogger::Initialize()Entering Initialize CSICReportLogger objectCSICReportLogger::LogBytes()CSICReportLogger::_CloseLogFileCloseLogFile\%%s%%.%dd.%%sCan't find next file, ErrNo=%d%s*.%sTXTCSICReportLogger::RotateFileName()X86PROCESSOR_ARCHITEW6432PROCESSOR_ARCHITECTUREAfter uninstall driver=%dD:\ActiveClean\src\user\RootkitScanner\source\TMRKScanWin.cpp(Needn't waiting)bStopped=%dWinAppDestructor()(After waiting)bStopped=%d+----------------------------------------------------+ vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: %sOriginalFileName vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: OD.H%sSpecialBuild%sPrivateBuild%sLegalTrademarks%sComments%sProductVersion%sProductName%sOriginalFileName%sLegalCopyright%sInternalName%sFileVersion%sFileDescription%sCompanyName\StringFileInfo\%04X%04X\\VarFileInfo\Translation\Leaving destruct CSICReportLogger objectD:\ActiveClean\src\user\RootkitScanner\source\SICReportLogger.cppCSICReportLogger::~CSICReportLogger()Entering destruct CSICReportLogger objectLog File Handle not Initialized.CSIC::LogString()No memory space can be allocated.CSIC::LogSingleString()leaving Initialize CSIC scan object ret=%d%s%s\%s\%sSICLOGCSICReportLogger::Initialize()Entering Initialize CSICReportLogger objectCSICReportLogger::LogBytes()CSICReportLogger::_CloseLogFileCloseLogFile\%%s%%.%dd.%%sCan't find next file, ErrNo=%d%s*.%sTXTCSICReportLogger::RotateFileName()X86PROCESSOR_ARCHITEW6432PROCESSOR_ARCHITECTUREAfter uninstall driver=%dD:\ActiveClean\src\user\RootkitScanner\source\TMRKScanWin.cpp(Needn't waiting)bStopped=%dWinAppDestructor()(After waiting)bStopped=%d+----------------------------------------------------+ vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: OriginalFilenameTmComm.sysN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: OriginalFilenametmcomeng.dllN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: OriginalFilenameTmEngDrv.dllN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeBinary or memory string: OriginalFilenameRootkitBuster.exeN vs PDFonlineseguro.exe
                Source: PDFonlineseguro.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: RemotePCPrinter.exe.0.drBinary string: \Device\LanmanRedirector\
                Source: RemotePCPrinter.exe.0.drBinary string: \\\Device\Harddisk
                Source: RemotePCPrinter.exe.0.drBinary string: \SystemRoot\TmComm.log\Device\TmComm>>> CFG-GetSDTProc(%d, %s)=%p
                Source: RemotePCPrinter.exe.0.drBinary string: Utility\??\\??\UNC\\Device\HarddiskIoValidateDeviceIoControlAccessIoCreateDeviceSecureD:P
                Source: RemotePCPrinter.exe.0.drBinary string: \Device\LanmanRedirector\;
                Source: RemotePCPrinter.exe.0.drBinary string: \??\\??\UNC\\\?\\??\\Registry\Machine\\Registry\User\\Registry\Machine\Software\Classes\\Registry\Machine\System\CurrentControlSet\Hardware Profiles\Current\*.**\Device\LanmanRedirector\;\Device\LanmanRedirector\\??\UNC\\SystemRoot\\??\\Device\LanmanRedirector\;\Device\LanmanRedirector\\??\UNC\\SystemRoot\\??\
                Source: RemotePCPrinter.exe.0.drBinary string: aD\\\Device\Harddisk
                Source: classification engineClassification label: mal92.evad.winEXE@3/1@1/1
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00407070 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00407070
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004068B0 FindResourceW,LoadResource,SizeofResource,CreateFileW,WriteFile,CloseHandle,0_2_004068B0
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeFile created: C:\Users\user\Documents\NordVPNnetworkTAPJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\mono1234
                Source: PDFonlineseguro.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: PDFonlineseguro.exeString found in binary or memory: >>> CFG-AddEP(%03x, %03x)=%#x
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeFile read: C:\Users\user\Desktop\PDFonlineseguro.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\PDFonlineseguro.exe "C:\Users\user\Desktop\PDFonlineseguro.exe"
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeSection loaded: a.dllJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: PDFonlineseguro.exeStatic file information: File size 2334801 > 1048576
                Source: PDFonlineseguro.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1e3000
                Source: PDFonlineseguro.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: D:\ActiveClean\src\user\TMCOMMENG\Release\tmcomeng.pdbPMZ source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\tmavsetup\Release\TmEngDrv.pdbP source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\RootkitScanner\Release\RootkitBuster.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\tmavsetup\Release\TmEngDrv.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: D:\ActiveClean\src\user\TMCOMMENG\Release\tmcomeng.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: d:\activeclean\src\sys\output\fre_wxp_x86\i386\tmcomm.pdb source: PDFonlineseguro.exe, RemotePCPrinter.exe.0.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeUnpacked PE file: 0.2.PDFonlineseguro.exe.400000.0.unpack
                Source: Yara matchFile source: 9.2.csc.exe.8059828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.csc.exe.6b60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.2514402981.0000000007FD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2513804925.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1912, type: MEMORYSTR
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0040DC10 push eax; ret 0_2_0040DC3E
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0040F688 push eax; ret 0_2_0040F6A6
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00921630 push edi; retf 0000h0_2_00921635
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_050F71F4 push es; ret 9_2_050F71F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_050F6991 pushad ; retf 9_2_050F699D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A426E3 push es; ret 9_2_06A426E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4256B push es; retf 9_2_06A4256C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4254D push es; ret 9_2_06A4255C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A4255F push es; ret 9_2_06A42560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A48331 pushfd ; ret 9_2_06A48337
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_06A48A2B push es; retf 9_2_06A48A2C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_094DB7D0 pushad ; iretd 9_2_094DB7D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_096A3583 push edx; iretd 9_2_096A358A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0970511E pushad ; retf 9_2_09705120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_09703D0F push ebx; ret 9_2_09703D15
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_0970607B push eax; retf 9_2_0970607C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 9_2_09708082 pushfd ; retf 9_2_09708083

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeFile created: C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exeJump to dropped file
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeFile created: C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exeJump to dropped file
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NordicVPNJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NordicVPNJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: PDFonlineseguro.exe, 00000000.00000000.1248008280.000000000045C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KeServiceDescriptorTable
                Source: PDFonlineseguro.exe, 00000000.00000002.1522101624.0000000002984000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KeServiceDescriptorTable
                Source: PDFonlineseguro.exeBinary or memory string: KeServiceDescriptorTable
                Source: RemotePCPrinter.exe.0.drBinary or memory string: KeServiceDescriptorTable
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004080C0 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,0_2_004080C0
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0040CB46 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0040CB46
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00401970 LoadLibraryW,LoadLibraryW,LoadLibraryW,GetModuleFileNameW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_00401970
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1912, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 4DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6E30000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 68E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 3569Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 6269Jump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeDropped PE file which has not been started: C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep count: 37 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1504Thread sleep count: 3569 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59875s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1504Thread sleep count: 6269 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59765s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59656s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59547s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59437s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59328s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -59094s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58984s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58875s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58766s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58655s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58547s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58437s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58325s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58218s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -58087s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57648s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57531s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57419s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57307s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57203s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -57094s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56984s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56875s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56766s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56648s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56531s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56418s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56312s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56201s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -56094s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55969s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55859s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55750s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55603s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55438s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -55016s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54688s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54233s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54124s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -54014s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -53906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -53797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -53688s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1272Thread sleep time: -53563s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00406A80 FindFirstFileW,FindClose,0_2_00406A80
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00405570 SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetLastError,GetLastError,GetLastError,FindClose,0_2_00405570
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58655Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58325Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58087Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57648Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57419Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57307Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56648Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56418Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56201Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55603Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54233Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54124Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54014Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 53906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 53797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 53688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 53563Jump to behavior
                Source: csc.exe, 00000009.00000002.2512923956.0000000004ED3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 440000 protect: page readonlyJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 440000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 440000Jump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 49DF008Jump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_00918675 cpuid 0_2_00918675
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0040F112 GetLocalTime,GetSystemTime,GetTimeZoneInformation,SendMessageW,FindWindowExW,0_2_0040F112
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_0040F112 GetLocalTime,GetSystemTime,GetTimeZoneInformation,SendMessageW,FindWindowExW,0_2_0040F112
                Source: C:\Users\user\Desktop\PDFonlineseguro.exeCode function: 0_2_004058C0 GetVersionExA,0_2_004058C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: csc.exe, 00000009.00000002.2515510450.0000000009730000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: csc.exe, 00000009.00000003.1501378645.000000000974E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                1
                Masquerading
                1
                Credential API Hooking
                2
                System Time Discovery
                Remote Services1
                Credential API Hooking
                1
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                31
                Process Injection
                11
                Disable or Modify Tools
                LSASS Memory131
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Registry Run Keys / Startup Folder
                141
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                1
                Access Token Manipulation
                NTDS141
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture1
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script31
                Process Injection
                LSA Secrets11
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Deobfuscate/Decode Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
                Obfuscated Files or Information
                DCSync135
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                newstaticfreepoint24.ddns-ip.net
                181.71.216.203
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://github.com/mgravell/protobuf-netcsc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/mgravell/protobuf-neticsc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJcsc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000009.00000002.2513943972.000000000708A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354csc.exe, 00000009.00000002.2513867627.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000083EB000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000009.00000003.1718188086.00000000082B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                181.71.216.203
                                newstaticfreepoint24.ddns-ip.netColombia
                                27831ColombiaMovilCOfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1587432
                                Start date and time:2025-01-10 11:32:12 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 7s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:13
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:PDFonlineseguro.exe
                                Detection:MAL
                                Classification:mal92.evad.winEXE@3/1@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 87%
                                • Number of executed functions: 343
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56, 4.175.87.197
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                TimeTypeDescription
                                06:53:37API Interceptor1208638x Sleep call for process: csc.exe modified
                                12:53:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NordicVPN C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exe
                                12:53:44AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NordicVPN C:\Users\user\Documents\NordVPNnetworkTAP\Lang\RemotePCPrinter.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                181.71.216.2032LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  newstaticfreepoint24.ddns-ip.net2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                  • 181.71.216.203
                                  SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                                  • 181.131.217.244
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ColombiaMovilCO1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  6.elfGet hashmaliciousUnknownBrowse
                                  • 181.70.170.80
                                  173634822473cd620521fcc8b42a4aac25bbd1c3f6e30c324045b1411f9747e93f432d0281839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  1736348224ad77cf86e491faad27e4b5decf1eb0bb26f16b0527e5ef488389ba353aa3db79582.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  17363482247f60133f013d62aae38c531ac95bb55a200a243b0e15fa7cf8e8923b2a10590f952.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  1736348224f7603a5c535b2b2f6cc29730626d73a967c67551d2d14f73b547fe7b5fc10393994.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  1736348224bd83df4c8d79407f8e7ac5cf8c08b59746ce37ff95772daa0a6283b50e2b0882115.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  17363482249a873460757a9239193679567953c11d17b898ff9845034e34f5d2e7f4521342673.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 179.15.136.6
                                  sh4.elfGet hashmaliciousMiraiBrowse
                                  • 177.252.126.19
                                  armv5l.elfGet hashmaliciousUnknownBrowse
                                  • 191.93.155.250
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\PDFonlineseguro.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):959667331
                                  Entropy (8bit):0.0378714111132915
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:0F5B1010F65FF84026DBB1599DC4C446
                                  SHA1:A93AD805CEF6121875AA671B8CB88556E8E41352
                                  SHA-256:ACBA3E7ADBCB4696364B3B2CF2DE8970A9C11F0A2F0D2B2059738EC7B13AB8BC
                                  SHA-512:E804413DC05443C564E50806B3FA746BCFA4120D9F081789B820F9AB5F20A5B243386B149C574729661FFDAD71A1A47236FF8FC654298DA5F644B8701DA32C65
                                  Malicious:true
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............@..@..@..@..@...L..@......@..A.q.@......@...K..@...N..@...J.5.@...K..@..K..@.X.F..@.Rich..@..H.$..PE..L......E..........................................@...........................#.........................................................x-...........................................................................................................text...~........................... ..`.rdata..............................@..@.data...H...........................@....rsrc...x-.......0...p..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.181190846088643
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:PDFonlineseguro.exe
                                  File size:2'334'801 bytes
                                  MD5:fddcc6db43b7aea103c315249bc12bbe
                                  SHA1:97f3ce1e1008deef73aed1d4f58bf184146ad243
                                  SHA256:bf836b14f236cce4cecd3b261b4e9b3f2f159ac9661cc2bf351e3533a7e8e5eb
                                  SHA512:601ae10269e94df22227976154ee72019142e32592edbba49971052c3e717dd52b966631b2a6f474b92eee8fa0a188d8d46d0cb29f5b9eb69854f403cdcfd3fc
                                  SSDEEP:24576:NUXOTB5dYdJ28+BaykZ+1XGRSK3FrTOX5F13db67IXgd2nB3TM1J2dv5iGoTEtQG:OaER4DXGJ1T+v1340Xf38GLC8e4
                                  TLSH:B3B5BF20A2859997F69274B4123FE5F7E22127309E11C487F3C59F2EB875DD0983AB87
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............@...@...@...@...@...L...@.......@...A.q.@.......@...K...@...N...@...J.5.@...K...@...K...@.X.F...@.Rich..@....H.$..PE..L..
                                  Icon Hash:03032725047cfe60
                                  Entrypoint:0x40d5c0
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:
                                  Time Stamp:0x45BF13D2 [Tue Jan 30 09:45:54 2007 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:5fb09959021d8f9c65e9a957b247adac
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push FFFFFFFFh
                                  push 00444FB0h
                                  push 004114D0h
                                  mov eax, dword ptr fs:[00000000h]
                                  push eax
                                  mov dword ptr fs:[00000000h], esp
                                  sub esp, 58h
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-18h], esp
                                  call dword ptr [004413C8h]
                                  xor edx, edx
                                  mov dl, ah
                                  mov dword ptr [00459274h], edx
                                  mov ecx, eax
                                  and ecx, 000000FFh
                                  mov dword ptr [00459270h], ecx
                                  shl ecx, 08h
                                  add ecx, edx
                                  mov dword ptr [0045926Ch], ecx
                                  shr eax, 10h
                                  mov dword ptr [00459268h], eax
                                  push 00000001h
                                  call 00007F46E062C8F9h
                                  pop ecx
                                  test eax, eax
                                  jne 00007F46E0628B5Ah
                                  push 0000001Ch
                                  call 00007F46E0628C17h
                                  pop ecx
                                  call 00007F46E062C5DAh
                                  test eax, eax
                                  jne 00007F46E0628B5Ah
                                  push 00000010h
                                  call 00007F46E0628C06h
                                  pop ecx
                                  xor esi, esi
                                  mov dword ptr [ebp-04h], esi
                                  call 00007F46E062C3B4h
                                  call 00007F46E062C30Eh
                                  mov dword ptr [0045AD14h], eax
                                  call 00007F46E062C197h
                                  mov dword ptr [0045925Ch], eax
                                  call 00007F46E062BF64h
                                  call 00007F46E062BEA7h
                                  call 00007F46E0629BBCh
                                  mov dword ptr [ebp-30h], esi
                                  lea eax, dword ptr [ebp-5Ch]
                                  push eax
                                  call dword ptr [0044120Ch]
                                  call 00007F46E062BE4Bh
                                  mov dword ptr [ebp-64h], eax
                                  test byte ptr [ebp-30h], 00000001h
                                  je 00007F46E0628B58h
                                  movzx eax, word ptr [ebp-2Ch]
                                  Programming Language:
                                  • [EXP] VC++ 6.0 SP5 build 8804
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4b4980xc8.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x1e2d78.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x417e00x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x410000x7dc.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x3fa7e0x40000ce4e2154cbe4e7156492dc1cc0f693ceFalse0.5431098937988281data6.484004415784614IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x410000xceba0xd00019619226e29a06fa4d01a78b7906fd9eFalse0.4609375data5.733152244637936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x4e0000xd8480x900000473552ce4b9e86c7a55926c18dc927False0.2333441840277778data3.330419442779499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x5c0000x1e2d780x1e3000c02073652d12fcfb1dd9e62784ad4fe1False0.628267845011646data7.322211817710192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  CATALOG0x5cbac0x2974dataEnglishUnited States0.534206558612891
                                  DRIVER0x5f5200x19190PE32 executable (native) Intel 80386, for MS WindowsChineseTaiwan0.47299610894941635
                                  INFINSTALL0x786b00x996Windows setup INFormationEnglishUnited States0.40179299103504484
                                  TMCOMMDLL0x790480x2b047PE32 executable (DLL) (GUI) Intel 80386, for MS WindowsChineseTaiwan0.42348140454826644
                                  TMENGDRV0xa40900x1b047PE32 executable (DLL) (GUI) Intel 80386, for MS WindowsChineseTaiwan0.4508824087545069
                                  RT_CURSOR0xbf0d80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
                                  RT_CURSOR0xbf20c0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
                                  RT_BITMAP0xbf2c00x55028PC bitmap, Windows 3.x format, 44486 x 2 x 51, image size 348736, cbSize 348200, bits offset 540.9996209075244112
                                  RT_BITMAP0x1142e80x33b8cPC bitmap, Windows 3.x format, 26784 x 2 x 54, image size 212356, cbSize 211852, bits offset 541.0001746502275173
                                  RT_BITMAP0x147e740x5b78Device independent bitmap graphic, 507 x 44 x 8, image size 22352ChineseTaiwan0.3262726340963444
                                  RT_BITMAP0x14d9ec0x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404EnglishUnited States0.34615384615384615
                                  RT_BITMAP0x14dfd00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
                                  RT_BITMAP0x14e0880x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260EnglishUnited States0.28296703296703296
                                  RT_BITMAP0x14e1f40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
                                  RT_ICON0x14e3380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.37436413107772387
                                  RT_ICON0x15eb600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.3590576287198866
                                  RT_ICON0x162d880x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.295701464336325
                                  RT_ICON0x166fb00xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200ChineseTaiwan0.5231481481481481
                                  RT_DIALOG0x167c580x4d6dataEnglishUnited States0.4701130856219709
                                  RT_DIALOG0x1681300xe4dataChineseTaiwan0.6622807017543859
                                  RT_DIALOG0x1682140xe8dataEnglishUnited States0.6336206896551724
                                  RT_STRING0x1682fc0x71adataChineseTaiwan0.323982398239824
                                  RT_STRING0x168a180x4e6dataChineseTaiwan0.38118022328548645
                                  RT_STRING0x168f000x2f6dataChineseTaiwan0.41688654353562005
                                  RT_STRING0x1691f80x9a4dataChineseTaiwan0.27836304700162073
                                  RT_STRING0x169b9c0x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
                                  RT_STRING0x169c200x2adataEnglishUnited States0.5476190476190477
                                  RT_STRING0x169c4c0x14adataEnglishUnited States0.5060606060606061
                                  RT_STRING0x169d980x4e2dataEnglishUnited States0.376
                                  RT_STRING0x16a27c0x2a2dataEnglishUnited States0.28338278931750743
                                  RT_STRING0x16a5200x2dcdataEnglishUnited States0.36885245901639346
                                  RT_STRING0x16a7fc0xacdataEnglishUnited States0.45348837209302323
                                  RT_STRING0x16a8a80xdedataEnglishUnited States0.536036036036036
                                  RT_STRING0x16a9880x4c4dataEnglishUnited States0.3221311475409836
                                  RT_STRING0x16ae4c0x264dataEnglishUnited States0.3741830065359477
                                  RT_STRING0x16b0b00x2cdataEnglishUnited States0.5227272727272727
                                  RT_RCDATA0x16b0dc0x1800PE32+ executable (console) x86-64, for MS Windows0.5719401041666666
                                  RT_RCDATA0x16c8dc0x24780data0.7689053127677806
                                  RT_RCDATA0x19105c0x4e550Delphi compiled form 'TBaseFrame'0.36960803869745174
                                  RT_RCDATA0x1df5ac0x1cc3eDelphi compiled form '\017TFanTasticFrame\016FanTasticFrame'0.5127989679346812
                                  RT_RCDATA0x1fc1ec0x136feDelphi compiled form '\016TfrmAutoTuning'0.5060290903609918
                                  RT_RCDATA0x20f8ec0x136feDelphi compiled form '\016TfrmAutoTuning'0.6512548044313814
                                  RT_RCDATA0x222fec0x1b681Delphi compiled form 'TMsgBoxForm'0.5580320158208397
                                  RT_GROUP_CURSOR0x23e6700x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
                                  RT_GROUP_ICON0x23e6940x14dataChineseTaiwan1.15
                                  RT_VERSION0x23e6a80x458dataEnglishUnited States0.427158273381295
                                  RT_MANIFEST0x23eb000x277XML 1.0 document, ASCII text, with CRLF line terminatorsChineseTaiwan0.5150554675118859
                                  DLLImport
                                  VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                  COMCTL32.dll_TrackMouseEvent, ImageList_Destroy, ImageList_Create, ImageList_LoadImageW, ImageList_Merge, ImageList_Read, ImageList_Write
                                  KERNEL32.dllDuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, MoveFileW, GetVolumeInformationW, GetFullPathNameW, GetStringTypeExW, GetThreadLocale, GetShortPathNameW, GetFileTime, LocalFileTimeToFileTime, SystemTimeToFileTime, SetFileTime, SetFileAttributesW, FileTimeToLocalFileTime, GetStartupInfoW, ExitProcess, RtlUnwind, GetLocalTime, RaiseException, HeapFree, HeapAlloc, SetConsoleCtrlHandler, CreateThread, ExitThread, GetTimeZoneInformation, GetSystemTime, HeapReAlloc, HeapSize, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetEnvironmentStrings, GetCommandLineA, SetHandleCount, GetFileType, SetErrorMode, GetModuleFileNameA, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, FatalAppExitA, SetUnhandledExceptionFilter, VirtualAlloc, IsBadWritePtr, LCMapStringA, LCMapStringW, GetFileAttributesA, IsBadReadPtr, IsBadCodePtr, GetStringTypeA, GetStringTypeW, GetCPInfo, IsValidLocale, IsValidCodePage, GetLocaleInfoA, EnumSystemLocalesA, GetUserDefaultLCID, CompareStringA, CompareStringW, SetEnvironmentVariableW, GetExitCodeProcess, CreateProcessA, SetStdHandle, GetACP, GetOEMCP, SetEnvironmentVariableA, GetLocaleInfoW, GetCurrentProcessId, GetOverlappedResult, DeviceIoControl, CreateEventA, InterlockedExchange, QueryDosDeviceW, GetLogicalDriveStringsW, GetWindowsDirectoryW, QueryDosDeviceA, GetLogicalDriveStringsA, GetWindowsDirectoryA, OutputDebugStringW, CreateMailslotW, SleepEx, GetFullPathNameA, GetCurrentDirectoryA, FindResourceA, GlobalAddAtomA, GetProfileStringA, GlobalGetAtomNameW, WritePrivateProfileStringW, GetPrivateProfileStringW, GetPrivateProfileIntW, GetProcessVersion, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, GlobalReAlloc, LeaveCriticalSection, TlsFree, GlobalHandle, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalAlloc, GlobalFlags, lstrcmpiW, CreateEventW, SetThreadPriority, SetEvent, lstrcmpW, GlobalAlloc, lstrcmpA, lstrcmpiA, GetCurrentThread, lstrcpynW, MulDiv, SetLastError, FormatMessageW, LocalFree, GetDriveTypeA, InterlockedDecrement, InterlockedIncrement, LoadLibraryA, lstrlenA, GetVersion, lstrcatW, GetCurrentThreadId, GlobalAddAtomW, GlobalFindAtomW, GlobalDeleteAtom, lstrcpyW, GlobalLock, GlobalUnlock, GlobalFree, LockResource, TerminateProcess, MoveFileExW, SuspendThread, ResumeThread, CreateProcessW, GetVersionExW, WaitForSingleObject, GetCurrentProcess, Sleep, GetSystemDirectoryW, CopyFileW, FindResourceW, LoadResource, SizeofResource, GetTempPathW, CreateMutexW, GetCommandLineW, AllocConsole, SetConsoleTitleW, GetStdHandle, WriteConsoleW, ReadConsoleW, FreeConsole, GetCurrentDirectoryW, GetModuleHandleA, GetModuleHandleW, GetVersionExA, DeleteFileW, SetCurrentDirectoryW, FindFirstFileW, FindNextFileW, GetLastError, FindClose, GetFileAttributesW, CreateDirectoryW, lstrlenW, FileTimeToSystemTime, WideCharToMultiByte, GetUserDefaultLangID, MultiByteToWideChar, LoadLibraryW, GetProcAddress, FreeLibrary, GetTickCount, CreateFileW, ReadFile, SetFilePointer, GetFileSize, WriteFile, CloseHandle, GetModuleFileNameW, GetStartupInfoA
                                  USER32.dllIsDialogMessageW, SetWindowTextW, MoveWindow, ShowWindow, EnableMenuItem, CheckMenuItem, SetMenuItemBitmaps, ModifyMenuW, GetMenuState, LoadBitmapW, GetMenuCheckMarkDimensions, ClientToScreen, GetWindowDC, BeginPaint, EndPaint, TabbedTextOutW, DrawTextW, GrayStringW, ShowOwnedPopups, SetCursor, ValidateRect, TranslateMessage, GetMessageW, wvsprintfW, DestroyMenu, GetClassNameW, PtInRect, GetDesktopWindow, GetDialogBaseUnits, LoadCursorW, GetSysColorBrush, SetCapture, ReleaseCapture, WaitMessage, GetWindowThreadProcessId, WindowFromPoint, InsertMenuW, GetMenuStringW, SetRectEmpty, LoadAcceleratorsW, TranslateAcceleratorW, LoadMenuW, SetMenu, ReuseDDElParam, UnpackDDElParam, BringWindowToTop, CharUpperW, CheckRadioButton, CheckDlgButton, UpdateWindow, SendDlgItemMessageW, SendDlgItemMessageA, MapWindowPoints, PeekMessageW, DispatchMessageW, GetFocus, SetFocus, AdjustWindowRectEx, EqualRect, DeferWindowPos, BeginDeferWindowPos, EndDeferWindowPos, IsWindowVisible, ScrollWindow, GetScrollInfo, SetScrollInfo, ShowScrollBar, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, GetTopWindow, IsChild, GetCapture, ScrollWindowEx, GetClassInfoW, RegisterClassW, GetMenu, GetMenuItemCount, GetSubMenu, GetMenuItemID, TrackPopupMenu, SetWindowPlacement, GetWindowTextLengthW, GetWindowTextW, GetDlgCtrlID, GetKeyState, DefWindowProcW, CreateWindowExW, SetWindowsHookExW, CallNextHookEx, SetPropW, UnhookWindowsHookEx, GetPropW, CallWindowProcW, RemovePropW, GetMessageTime, GetMessagePos, GetLastActivePopup, GetForegroundWindow, SetForegroundWindow, GetWindow, SetWindowLongW, SetWindowPos, RegisterWindowMessageW, IntersectRect, SystemParametersInfoW, GetWindowPlacement, GetWindowRect, GetNextDlgTabItem, EndDialog, GetActiveWindow, SetActiveWindow, IsWindow, DestroyWindow, GetParent, GetWindowLongW, GetDlgItem, IsWindowEnabled, GetDC, GetSysColor, ReleaseDC, PostQuitMessage, PostMessageW, IsIconic, DrawIcon, UnregisterClassW, GetWindowTextLengthA, HideCaret, ShowCaret, ExcludeUpdateRgn, AppendMenuW, LoadIconW, ExitWindowsEx, wsprintfW, FindWindowExW, GetSystemMenu, DeleteMenu, LoadStringA, MessageBoxA, LoadStringW, MessageBoxW, GetClientRect, GetCursorPos, ScreenToClient, GetSystemMetrics, InvalidateRect, CopyRect, DrawEdge, DrawIconEx, InflateRect, IsDlgButtonChecked, SetDlgItemTextW, SetDlgItemInt, GetDlgItemTextW, WinHelpW, GetDlgItemInt, OffsetRect, FillRect, SendMessageW, RedrawWindow, EnableWindow, CreateDialogIndirectParamW, GetPropA, SetPropA, SetWindowLongA, GetClassNameA, IsWindowUnicode, SendMessageA, GetWindowLongA, SetWindowsHookExA, RemovePropA, CallWindowProcA, CharNextA, DefWindowProcA, DefDlgProcA, GetClassInfoA, DrawFocusRect, DrawTextA, GetWindowTextA
                                  GDI32.dllSetPolyFillMode, SetROP2, SetStretchBltMode, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, OffsetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, SelectClipRgn, ExcludeClipRect, IntersectClipRect, OffsetClipRgn, MoveToEx, LineTo, SetTextAlign, SetTextJustification, SetTextCharacterExtra, SetMapperFlags, GetCurrentPositionEx, ArcTo, SetArcDirection, SetTextColor, PolylineTo, SetColorAdjustment, PolyBezierTo, DeleteObject, GetClipRgn, CreateRectRgn, SetBkMode, ExtSelectClipRgn, PlayMetaFileRecord, GetObjectType, EnumMetaFile, PlayMetaFile, GetDeviceCaps, GetViewportExtEx, GetWindowExtEx, CreatePen, ExtCreatePen, CreateSolidBrush, CreateHatchBrush, CreatePatternBrush, CreateDIBPatternBrushPt, PtVisible, RectVisible, TextOutW, ExtTextOutW, Escape, GetMapMode, PatBlt, SetRectRgn, CombineRgn, CreateRectRgnIndirect, CreateFontIndirectW, DPtoLP, GetTextMetricsW, ExtTextOutA, GetClipBox, GetDCOrgEx, CreateFontW, GetTextExtentPoint32W, SelectPalette, GetStockObject, SelectObject, RestoreDC, SaveDC, StartDocW, DeleteDC, CreateBitmap, GetObjectW, SelectClipPath, SetBkColor, GetTextExtentPointA, BitBlt, CreateCompatibleDC, PolyDraw, CreateDIBitmap, Rectangle
                                  comdlg32.dllGetFileTitleW
                                  WINSPOOL.DRVClosePrinter, DocumentPropertiesW, OpenPrinterW
                                  ADVAPI32.dllControlService, StartServiceW, OpenServiceW, DeleteService, CreateServiceW, OpenSCManagerW, CloseServiceHandle, RegDeleteKeyW, RegDeleteValueW, RegSetValueExW, RegOpenKeyExW, RegCreateKeyExW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyW, RegQueryValueExW, RegCloseKey, QueryServiceStatus
                                  SHELL32.dllDragQueryFileW, DragFinish, DragAcceptFiles, ShellExecuteW, SHGetFileInfoW
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  ChineseTaiwan
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 10, 2025 11:33:34.788815022 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:34.793745041 CET3020349799181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:34.793822050 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:34.829684019 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:34.834594965 CET3020349799181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:34.834661007 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:34.839492083 CET3020349799181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:56.189295053 CET3020349799181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:56.189413071 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.198262930 CET4979930203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.203186035 CET3020349799181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:56.354326010 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.359231949 CET3020349925181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:56.359708071 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.361188889 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.366030931 CET3020349925181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:33:56.369227886 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:33:56.374111891 CET3020349925181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:17.748001099 CET3020349925181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:17.748334885 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.748334885 CET4992530203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.753268003 CET3020349925181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:17.854283094 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.859457970 CET3020349971181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:17.859658003 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.860388041 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.865174055 CET3020349971181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:17.865281105 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:17.870110989 CET3020349971181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:39.200934887 CET3020349971181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:39.201050043 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.201230049 CET4997130203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.206054926 CET3020349971181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:39.307499886 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.312429905 CET3020349972181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:39.312550068 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.313517094 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.318317890 CET3020349972181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:34:39.318523884 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:34:39.323318958 CET3020349972181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:00.683332920 CET3020349972181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:00.686790943 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.687334061 CET4997230203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.692145109 CET3020349972181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:00.792022943 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.796830893 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:00.797355890 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.797895908 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.802757978 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:00.803339005 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:00.808223009 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:13.671345949 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:13.676167011 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:13.683341026 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:13.688096046 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:16.060723066 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:16.065588951 CET3020349973181.71.216.203192.168.2.7
                                  Jan 10, 2025 11:35:16.067142963 CET4997330203192.168.2.7181.71.216.203
                                  Jan 10, 2025 11:35:16.071928978 CET3020349973181.71.216.203192.168.2.7
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 10, 2025 11:33:34.768160105 CET5015653192.168.2.71.1.1.1
                                  Jan 10, 2025 11:33:34.783639908 CET53501561.1.1.1192.168.2.7
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 10, 2025 11:33:34.768160105 CET192.168.2.71.1.1.10x5d44Standard query (0)newstaticfreepoint24.ddns-ip.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 10, 2025 11:33:34.783639908 CET1.1.1.1192.168.2.70x5d44No error (0)newstaticfreepoint24.ddns-ip.net181.71.216.203A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:05:33:08
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\PDFonlineseguro.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\PDFonlineseguro.exe"
                                  Imagebase:0x400000
                                  File size:2'334'801 bytes
                                  MD5 hash:FDDCC6DB43B7AEA103C315249BC12BBE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:05:33:30
                                  Start date:10/01/2025
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                  Imagebase:0x5e0000
                                  File size:2'141'552 bytes
                                  MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.2514402981.0000000007FD3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.2513804925.0000000006B60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.2513943972.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:17.9%
                                    Dynamic/Decrypted Code Coverage:98.8%
                                    Signature Coverage:32.6%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:300
                                    execution_graph 38533 415891 38534 415897 K32GetPerformanceInfo 38533->38534 38536 415982 38534->38536 38536->38536 38537 41eae0 38538 41eaf6 ExitProcess 38537->38538 38540 4133d4 38541 413405 LoadLibraryA 38540->38541 38543 41347c 38541->38543 38548 41397e 11 API calls ctype 38543->38548 38545 413973 38549 413a53 11 API calls ctype 38545->38549 38548->38545 38550 41c869 38551 41c86e VirtualProtect 38550->38551 38553 41c90c 38551->38553 38554 41c943 38551->38554 38553->38553 38556 41ca72 38554->38556 38557 41ca7b 38556->38557 38708 41ca82 38557->38708 38909 8fcc8f 38557->38909 38913 934b6c 38557->38913 38923 93376c 38557->38923 38935 93476e 38557->38935 38947 92cb6e 38557->38947 38967 927768 38557->38967 38981 92db66 38557->38981 38995 8f637f 38557->38995 39001 90c37c 38557->39001 39009 90eb7a 38557->39009 39019 934b7b 38557->39019 39029 8f5b6c 38557->39029 39035 929370 38557->39035 39043 90ef71 38557->39043 39055 934372 38557->39055 39067 926f72 38557->39067 39087 92db4d 38557->39087 39102 92c74d 38557->39102 39122 909f4d 38557->39122 39132 93a74e 38557->39132 39140 926745 38557->39140 39155 8f5759 38557->39155 39171 8fc75b 38557->39171 39179 8fcf5c 38557->39179 39183 909354 38557->39183 39197 8f634f 38557->39197 39201 8f6730 38557->39201 39209 92df2d 38557->39209 39223 926f2f 38557->39223 39243 929729 38557->39243 39246 8f6336 38557->39246 39250 928b3f 38557->39250 39260 934739 38557->39260 39272 926f34 38557->39272 39292 90eb33 38557->39292 39309 90c331 38557->39309 39321 92d333 38557->39321 39341 928b32 38557->39341 39351 92d30c 38557->39351 39371 934308 38557->39371 39383 92cb0b 38557->39383 39403 92fbe5 38557->39403 39413 92d7e1 38557->39413 39435 9353fb 38557->39435 39439 90c7f6 38557->39439 39447 92dbcc 38557->39447 39461 9273cb 38557->39461 39480 8fcfd7 38557->39480 39487 92ffca 38557->39487 39493 902fc5 38557->39493 39496 927bc1 38557->39496 39502 92ffc1 38557->39502 39508 8f67c4 38557->39508 39516 933bd9 38557->39516 39528 90a3d9 38557->39528 39535 92d7d4 38557->39535 39557 90efd4 38557->39557 39569 90a3a6 38557->39569 39581 9277a6 38557->39581 39597 9337a1 38557->39597 39609 933ba3 38557->39609 39622 93a7bd 38557->39622 39628 90a7bd 38557->39628 39635 934bbf 38557->39635 39645 8f63ae 38557->39645 39651 92d38c 38557->39651 39670 928b84 38557->39670 39688 908f82 38557->39688 39704 8fc782 38557->39704 39711 8f5784 38557->39711 39715 927f99 CreateDirectoryW 38557->39715 39718 908f91 38557->39718 39732 926a64 38557->39732 39748 92767d 38557->39748 39766 8fca60 38557->39766 39772 933e7c 38557->39772 39784 90f27e 38557->39784 39788 93367e 38557->39788 39800 92da7b 38557->39800 39816 928a7b 38557->39816 39831 92d674 38557->39831 39849 926a77 38557->39849 39864 927276 38557->39864 39874 92de76 38557->39874 39888 928a76 38557->39888 39903 929676 38557->39903 39909 92da71 38557->39909 39925 92ca70 38557->39925 39945 928e73 38557->39945 39955 8fc26f 38557->39955 39959 92924f 38557->39959 39969 8fca55 38557->39969 39975 8f6659 38557->39975 39983 92ee44 38557->39983 39997 927a46 38557->39997 40003 934e40 38557->40003 40013 92725d 38557->40013 40023 92925e 38557->40023 40033 928e58 38557->40033 40043 92965b 38557->40043 40050 93365a 38557->40050 40062 92d651 38557->40062 40080 929e50 38557->40080 40084 90a251 38557->40084 40093 92ce53 38557->40093 40113 928652 38557->40113 40123 926a28 38557->40123 40144 926e25 38557->40144 40154 93aa24 38557->40154 40158 927227 38557->40158 40168 90ee24 38557->40168 40182 92fe3e 38557->40182 40190 90c63a 38557->40190 40200 929e35 38557->40200 40204 92da34 38557->40204 40215 8fd22e 38557->40215 40219 92f232 38557->40219 40225 927208 38557->40225 40237 927a0a 38557->40237 40247 926e07 38557->40247 40263 92de07 38557->40263 40277 933e00 38557->40277 40289 92ce03 38557->40289 40321 92de02 38557->40321 40335 92921c 38557->40335 40341 928e1f 38557->40341 40365 92a21a 38557->40365 40369 929211 38557->40369 40375 90ee12 38557->40375 40390 929e10 38557->40390 40394 8fcafc 38557->40394 40398 92c6fd 38557->40398 40418 92d6ff 38557->40418 40440 928af8 38557->40440 40460 9336f4 38557->40460 40472 934ef6 38557->40472 40482 92faf2 38557->40482 40485 9272ca 38557->40485 40495 9266c5 38557->40495 40510 90b6c3 38557->40510 40518 928ac1 38557->40518 40528 92fadf 38557->40528 40534 92fada 38557->40534 40540 92deda 38557->40540 40554 92fad4 38557->40554 40560 92dad7 38557->40560 40576 926ea8 38557->40576 40586 92feaa 38557->40586 40594 9342a4 38557->40594 40606 92caa7 38557->40606 40626 93a6a6 38557->40626 40630 9272b1 38557->40630 40640 934e8d 38557->40640 40652 92ee8a 38557->40652 40658 8fc298 38557->40658 40662 933e83 38557->40662 40674 93369d 38557->40674 40686 928e99 38557->40686 40690 8fca85 38557->40690 40696 935e97 38557->40696 40700 92c691 38557->40700 40720 929292 38557->40720 40726 92d96c 38557->40726 40742 930168 38557->40742 40746 934d6a 38557->40746 40758 92696a 38557->40758 40782 92716a 38557->40782 40794 92d564 38557->40794 40812 92cd74 38557->40812 40846 90b172 38557->40846 40850 8f596e 38557->40850 40856 92d173 38557->40856 40876 8f656f 38557->40876 40886 90c94e 38557->40886 40889 92854f 38557->40889 40902 927d4e 38557->40902 40908 8f5d5b 38557->40908 40911 929d41 38557->40911 40915 8fd141 38557->40915 40919 928d5c 38557->40919 40935 92d158 38557->40935 40956 926d5b 38557->40956 40966 92e150 38557->40966 40978 92d129 38557->40978 41010 92852a 38557->41010 41023 8fc53a 38557->41023 41029 935127 38557->41029 41033 92d921 38557->41033 41051 90c521 38557->41051 41061 928d3d 38557->41061 41079 90f13d 38557->41079 41083 8fb522 38557->41083 41089 93413a 38557->41089 41101 92753a 38557->41101 41117 927535 38557->41117 41133 928537 38557->41133 41146 92e131 38557->41146 41158 8fc52f 38557->41158 41164 928532 38557->41164 41177 92d50c 38557->41177 41193 90a509 38557->41193 41202 92910a 38557->41202 41212 930104 38557->41212 41216 935104 38557->41216 41220 909d05 38557->41220 41234 927901 38557->41234 41240 929d03 38557->41240 41244 8fc500 38557->41244 41254 92751f 38557->41254 41270 8f6503 38557->41270 41280 8f5d08 38557->41280 41284 92d513 38557->41284 41300 9335e9 38557->41300 41312 8fc5f6 38557->41312 41318 92a1eb 38557->41318 41322 934de3 38557->41322 41334 92edfe 38557->41334 41348 929dfe 38557->41348 41352 8fd5eb 38557->41352 41356 9341f2 38557->41356 41368 9279cf 38557->41368 41374 928dce 38557->41374 41384 9349c8 38557->41384 41394 90adca 38557->41394 41400 90edc8 38557->41400 41418 9271c5 38557->41418 41430 9301c4 38557->41430 41434 9269c7 38557->41434 41450 92ddc7 38557->41450 41466 934dc6 38557->41466 41478 908dd9 38557->41478 41501 93a9d4 38557->41501 41507 9269d6 38557->41507 41522 8fd1cf 38557->41522 41526 92cdad 38557->41526 41546 8fd1b4 38557->41546 41550 92d1ab 38557->41550 41562 9341ab 38557->41562 41574 929da5 38557->41574 41578 909da6 38557->41578 41592 8f51b9 38557->41592 41596 934da7 38557->41596 41608 8f5dbc 38557->41608 41612 8f51bf 38557->41612 41616 926dbe 38557->41616 41635 9291be 38557->41635 41643 9269b5 38557->41643 41659 92d1b4 38557->41659 41671 8f59ab 38557->41671 41677 9305b3 38557->41677 41681 8f5d93 38557->41681 41685 92f18e 38557->41685 41691 92f189 38557->41691 41697 92d586 38557->41697 41713 8fc59c 38557->41713 41723 933d80 38557->41723 41735 928580 38557->41735 41743 90959f 38557->41743 41751 8f5d8c 38557->41751 41755 927590 38557->41755 41771 909992 38557->41771 41779 928c6f 38557->41779 41797 8f6875 38557->41797 41801 927c67 38557->41801 41807 928c66 38557->41807 41825 8fcc7d 38557->41825 41829 8f6862 38557->41829 41833 93407e 38557->41833 41845 90ec7b 38557->41845 41867 8f6465 38557->41867 41881 8fd067 38557->41881 41885 927c70 38557->41885 41891 928470 38557->41891 41904 934c71 38557->41904 41916 92c472 38557->41916 41937 92fc4c 38557->41937 41945 92884e 38557->41945 41958 90984b 38557->41958 41968 92f44b 38557->41968 41974 90f046 38557->41974 41984 92e044 38557->41984 41996 927846 38557->41996 42008 90a444 38557->42008 42019 92c45e 38557->42019 42040 90ac5b 38557->42040 42046 92e05b 38557->42046 42058 92d456 38557->42058 42074 927853 38557->42074 42086 8f5c4e 38557->42086 42090 930052 38557->42090 42096 928853 38557->42096 42109 934c53 38557->42109 42121 8f6830 38557->42121 42127 92902f 38557->42127 42137 8fd036 38557->42137 42141 933c2a 38557->42141 42153 90e423 38557->42153 42159 927423 38557->42159 42178 92c83d 38557->42178 42198 935439 38557->42198 42206 90b039 38557->42206 42214 93003a 38557->42214 42220 92d835 38557->42220 42242 8fcc29 38557->42242 42246 8fc42c 38557->42246 42256 92fc0e 38557->42256 42262 92d40e 38557->42262 42280 929008 38557->42280 42290 90b002 38557->42290 42300 90ec1f 38557->42300 42310 93341d 38557->42310 42321 8f680b 38557->42321 42328 8f640b 38557->42328 42332 92e012 38557->42332 42344 9268ef 38557->42344 42374 9274e9 38557->42374 42388 934ce9 38557->42388 42400 9350ea 38557->42400 42405 90c0e5 38557->42405 42408 927ce0 38557->42408 42414 9278fc 38557->42414 42420 934cfe 38557->42420 42432 935cf8 38557->42432 42438 9290f7 38557->42438 42448 934cf1 38557->42448 42460 8fd0ee 38557->42460 42464 92e4f3 38557->42464 42476 8f58d2 38557->42476 42480 8f54db 38557->42480 42483 928cc6 38557->42483 42501 9274dc 38557->42501 42515 9300d8 38557->42515 42519 90c4d7 38557->42519 42527 90f0d5 38557->42527 42536 92dcd2 38557->42536 42550 90ecaf 38557->42550 42560 92d8ae 38557->42560 42580 8f54bf 38557->42580 42585 8f58a1 38557->42585 42597 9300bf 38557->42597 42602 92d0be 38557->42602 42622 8fd0ad 38557->42622 42626 928c8f 38557->42626 42644 92c88e 38557->42644 42664 8f5896 38557->42664 42676 93008a 38557->42676 42682 92889c 38557->42682 42690 8fd086 38557->42690 42694 934c9a 38557->42694 42706 927c92 38557->42706 38910 8fcc92 CreateProcessW 38909->38910 38912 8fd69f 38910->38912 38912->38708 38914 934b7e 38913->38914 38915 935d7d 38914->38915 38918 934f13 38914->38918 38916 935e97 ReadFile 38915->38916 38917 935e8f ReadFile 38916->38917 38921 9350ea 2 API calls 38918->38921 38922 9350e0 38921->38922 38924 933bfc 38923->38924 38925 9347b8 VirtualAlloc 38924->38925 38926 9368b7 38925->38926 38927 9347df 38925->38927 38926->38708 38928 935d7d 38927->38928 38931 934f13 38927->38931 38936 934772 VirtualAlloc 38935->38936 38938 9368b7 38936->38938 38939 9347df 38936->38939 38938->38708 38940 935d7d 38939->38940 38943 934f13 38939->38943 38941 935e97 ReadFile 38940->38941 38945 9350ea 2 API calls 38943->38945 38952 92c8c2 38947->38952 38948 92cbdc 42712 92cbfb 23 API calls 38948->42712 38951 92da46 38953 92db66 11 API calls 38951->38953 38952->38948 38952->38951 38954 92db5e 38953->38954 38968 927825 38967->38968 38969 927846 25 API calls 38968->38969 38970 92783d 38969->38970 38971 9278e9 38970->38971 38972 92792c 38970->38972 38982 92df26 38981->38982 38983 92e012 10 API calls 38982->38983 38984 92e008 CloseHandle 38983->38984 38986 92e581 38984->38986 38996 8f63a1 38995->38996 38997 8f6390 VirtualAlloc 38995->38997 38996->38997 38999 8f6465 22 API calls 38996->38999 39000 8f68c9 38997->39000 38999->38997 39000->38708 39002 90c8c4 39001->39002 39003 90c92c 39002->39003 39006 90c96d 39002->39006 39004 90c94e VirtualAlloc 39003->39004 39005 90c944 39004->39005 39007 90d48f VirtualAlloc 39006->39007 39008 90d4c8 39007->39008 39008->38708 39010 90f0ae 39009->39010 39011 90f0bb 39010->39011 39014 90f157 39010->39014 39012 90f0d5 3 API calls 39011->39012 39013 90f0cd 39012->39013 39015 90f27e WriteProcessMemory 39014->39015 39016 90f274 39015->39016 39020 934b7e 39019->39020 39021 935d7d 39020->39021 39025 934f13 39020->39025 39022 935e97 ReadFile 39021->39022 39023 935e8f ReadFile 39022->39023 39027 9350ea 2 API calls 39025->39027 39028 9350e0 39027->39028 39030 8f5ab1 39029->39030 39031 8f5c4e VirtualAlloc 39030->39031 39033 8f5bc9 39030->39033 39031->39033 39032 8f68a4 VirtualAlloc 39034 8f68c9 39032->39034 39033->38708 39033->39032 39034->38708 39036 92937f 39035->39036 39038 9293f3 39036->39038 42717 9293fd RegOpenKeyExW RegOpenKeyExW RegOpenKeyExW 39036->42717 39039 929729 RegOpenKeyExW 39038->39039 39042 929721 39038->39042 39039->39042 39040 92a250 RegOpenKeyExW 39042->39040 39044 90efb2 39043->39044 39045 90efa3 39043->39045 39046 90efd4 5 API calls 39044->39046 39047 90f0bb 39045->39047 39050 90f157 39045->39050 39046->39045 39048 90f0d5 3 API calls 39047->39048 39049 90f0cd 39048->39049 39051 90f27e WriteProcessMemory 39050->39051 39052 90f274 39051->39052 39056 934391 VirtualAlloc 39055->39056 39058 9347df 39056->39058 39064 9368b7 39056->39064 39059 935d7d 39058->39059 39062 934f13 39058->39062 39060 935e97 ReadFile 39059->39060 39065 9350ea 2 API calls 39062->39065 39064->38708 39068 926f81 39067->39068 39069 926f96 39068->39069 39077 92728f 39068->39077 42718 92704f 32 API calls 39069->42718 39071 927344 42719 927372 29 API calls 39071->42719 39077->39071 39078 927303 CreateDirectoryW 39077->39078 39082 927e85 39078->39082 39088 92db66 11 API calls 39087->39088 39089 92db5e 39087->39089 39088->39089 39090 92e012 10 API calls 39089->39090 39091 92e008 CloseHandle 39090->39091 39093 92e581 39091->39093 39103 92c751 39102->39103 39104 92cbdc 39103->39104 39107 92da46 39103->39107 42722 92cbfb 23 API calls 39104->42722 39108 92db66 11 API calls 39107->39108 39109 92db5e 39108->39109 39123 909f69 39122->39123 39124 909ca8 39123->39124 39128 909f8e 39123->39128 42724 909cbe VirtualProtectEx VirtualProtectEx VirtualProtectEx 39124->42724 39130 90b3ac VirtualProtectEx 39128->39130 39133 93a788 39132->39133 39134 93a7bd 3 API calls 39133->39134 39139 93a997 WriteFile 39133->39139 39137 93a7b3 39134->39137 39136 93aad0 39136->38708 39137->39139 39139->39136 39143 926a85 39140->39143 39142 927e85 39146 926d39 39143->39146 39147 926d7c 39143->39147 39154 926a8e CreateDirectoryW 39143->39154 39150 926d5b 30 API calls 39146->39150 39148 926d51 39147->39148 39149 926dbe 37 API calls 39147->39149 39148->39154 39149->39148 39150->39148 39154->39142 39156 8f57b5 39155->39156 39157 8f5772 39155->39157 39159 8f5896 4 API calls 39156->39159 39170 8f577c 39156->39170 39158 8f5784 VirtualAlloc 39157->39158 39158->39170 39160 8f588b 39159->39160 39165 8f68a4 VirtualAlloc 39170->38708 39170->39165 39172 8fc76a 39171->39172 39174 8fc79e 39172->39174 42728 8fc7a7 CreateProcessW CreateProcessW 39172->42728 39175 8fcafc CreateProcessW 39174->39175 39178 8fcaf2 39174->39178 39175->39178 39180 8fd023 CreateProcessW 39179->39180 39182 8fd69f 39180->39182 39182->38708 39184 90938b VirtualAllocEx 39183->39184 39185 9093f7 39184->39185 39186 909416 39185->39186 39187 90b409 39185->39187 39198 8f6355 VirtualAlloc 39197->39198 39200 8f68c9 39198->39200 39200->38708 39202 8f6675 39201->39202 39203 8f67c4 3 API calls 39202->39203 39205 8f678d 39202->39205 39203->39205 39204 8f686a VirtualAlloc 39205->39204 39206 8f6875 VirtualAlloc 39205->39206 39206->39204 39210 92df46 39209->39210 39211 92e012 10 API calls 39210->39211 39212 92e008 CloseHandle 39211->39212 39224 926f81 39223->39224 39225 926f96 39224->39225 39233 92728f 39224->39233 42732 92704f 32 API calls 39225->42732 39227 927344 39233->39227 39234 927303 CreateDirectoryW 39233->39234 39244 92a250 RegOpenKeyExW 39243->39244 39245 92a27f 39244->39245 39245->38708 39247 8f6355 VirtualAlloc 39246->39247 39249 8f68c9 39247->39249 39249->38708 39253 928b4e 39250->39253 39251 92a250 RegOpenKeyExW 39254 9291be 6 API calls 39253->39254 39255 929137 39253->39255 39258 928e8c 39253->39258 39256 9291b4 39254->39256 39257 929729 RegOpenKeyExW 39255->39257 39255->39258 39256->39255 39257->39258 39258->39251 39261 934745 VirtualAlloc 39260->39261 39263 9347df 39261->39263 39269 9368b7 39261->39269 39264 935d7d 39263->39264 39265 934f13 39263->39265 39269->38708 39273 926f81 39272->39273 39274 926f96 39273->39274 39282 92728f 39273->39282 42735 92704f 32 API calls 39274->42735 39276 927344 39282->39276 39283 927303 CreateDirectoryW 39282->39283 39293 90eb4c 39292->39293 39294 90eb8f 39292->39294 42738 90eb5b WriteProcessMemory WriteProcessMemory WriteProcessMemory WriteProcessMemory 39293->42738 39296 90eba6 39294->39296 39298 90ec18 39294->39298 39299 90ec1f 4 API calls 39294->39299 39300 90f0bb 39296->39300 39304 90f157 39296->39304 39301 90ec7b 11 API calls 39298->39301 39299->39298 39301->39296 39310 90c362 39309->39310 39312 90c3a5 39309->39312 39311 90c37c 2 API calls 39310->39311 39313 90c374 39311->39313 39312->39313 42739 90c47a VirtualAlloc VirtualAlloc VirtualAlloc VirtualAlloc VirtualAlloc 39312->42739 39315 90c92c 39313->39315 39318 90c96d 39313->39318 39322 92d338 39321->39322 39323 92d40e 17 API calls 39322->39323 39324 92d404 39323->39324 39344 928b35 39341->39344 39342 92a250 RegOpenKeyExW 39345 9291be 6 API calls 39344->39345 39346 929137 39344->39346 39349 928e8c 39344->39349 39347 9291b4 39345->39347 39348 929729 RegOpenKeyExW 39346->39348 39346->39349 39347->39346 39348->39349 39349->39342 39352 92d295 39351->39352 39353 92d40e 17 API calls 39352->39353 39354 92d404 39353->39354 39372 9347ac VirtualAlloc 39371->39372 39374 9347df 39372->39374 39380 9368b7 39372->39380 39375 935d7d 39374->39375 39378 934f13 39374->39378 39380->38708 39384 92cb11 39383->39384 39385 92cbdc 39384->39385 39388 92da46 39384->39388 42742 92cbfb 23 API calls 39385->42742 39389 92db66 11 API calls 39388->39389 39404 92fbfe 39403->39404 39408 92fc04 39403->39408 39405 92fc0e 2 API calls 39404->39405 39405->39408 39406 92fc8c 39407 9300d8 CreateFileW 39406->39407 39408->39406 42744 92fdd6 CreateFileW CreateFileW 39408->42744 39414 92d77a 39413->39414 39416 92d7cd 39414->39416 39417 92d7d4 14 API calls 39414->39417 39415 92d892 39416->39415 39419 92d921 13 API calls 39416->39419 39417->39416 39419->39415 39436 9354be ReadFile 39435->39436 39438 9368b7 39436->39438 39438->38708 39440 90c822 39439->39440 39441 90c92c 39440->39441 39444 90c96d 39440->39444 39442 90c94e VirtualAlloc 39441->39442 39445 90d48f VirtualAlloc 39444->39445 39448 92dbfd 39447->39448 39449 92e012 10 API calls 39448->39449 39450 92e008 CloseHandle 39449->39450 39462 927427 39461->39462 39463 9274cb 39462->39463 39467 92743d 39462->39467 39474 92750c 39462->39474 39465 9274dc 26 API calls 39463->39465 39464 927846 25 API calls 39465->39467 39467->39464 39476 92767d 27 API calls 39474->39476 39476->39467 39481 8fcd01 39480->39481 39482 8fcfe7 39480->39482 39484 8fcf5c CreateProcessW 39481->39484 39483 8fd672 CreateProcessW 39482->39483 39486 8fd69f 39483->39486 39485 8fcf53 39484->39485 39486->38708 39488 92ffcd 39487->39488 39489 9300d8 CreateFileW 39488->39489 39490 9300cf CreateFileW 39489->39490 39494 9034f4 Wow64GetThreadContext 39493->39494 39495 903518 39494->39495 39495->38708 39497 927c28 CreateDirectoryW 39496->39497 39499 927e85 39497->39499 42749 927ea7 19 API calls 39499->42749 39503 92ffcd 39502->39503 39504 9300d8 CreateFileW 39503->39504 39505 9300cf CreateFileW 39504->39505 39509 8f6802 39508->39509 39512 8f67f6 39508->39512 39510 8f6830 2 API calls 39509->39510 39510->39512 39511 8f686a VirtualAlloc 39515 8f68c9 39511->39515 39512->39511 39513 8f6875 VirtualAlloc 39512->39513 39513->39511 39515->38708 39517 933bfc 39516->39517 39518 9347b8 VirtualAlloc 39517->39518 39519 9347df 39518->39519 39525 9368b7 39518->39525 39525->38708 39529 90a7e0 39528->39529 39530 90a848 39529->39530 39531 90ae43 VirtualProtectEx 39529->39531 39534 90b002 3 API calls 39529->39534 39530->38708 39533 90b3d2 39531->39533 39534->39531 39536 92d77a 39535->39536 39538 92d7cd 39536->39538 39539 92d7d4 13 API calls 39536->39539 39537 92d892 39538->39537 39541 92d921 13 API calls 39538->39541 39539->39538 39541->39537 39558 90f018 39557->39558 39560 90f00c 39557->39560 39559 90f046 4 API calls 39558->39559 39559->39560 39561 90f0bb 39560->39561 39564 90f157 39560->39564 39562 90f0d5 3 API calls 39561->39562 39565 90f27e WriteProcessMemory 39564->39565 39570 90a3b0 39569->39570 39571 90a3c5 39570->39571 39572 90a408 39570->39572 39573 90a3d9 4 API calls 39571->39573 39574 90a444 6 API calls 39572->39574 39584 927518 39581->39584 39593 927673 39581->39593 39582 927846 25 API calls 39583 92783d 39582->39583 39591 92767d 27 API calls 39584->39591 39584->39593 39591->39593 39593->39582 39598 9337e1 39597->39598 39599 9347b8 VirtualAlloc 39598->39599 39600 9368b7 39599->39600 39601 9347df 39599->39601 39600->38708 39610 933bd9 5 API calls 39609->39610 39611 933bcf 39610->39611 39612 9347b8 VirtualAlloc 39611->39612 39623 93a863 39622->39623 39624 93a9d4 2 API calls 39623->39624 39626 93a997 WriteFile 39623->39626 39624->39626 39627 93aad0 39626->39627 39627->38708 39629 90a7e0 39628->39629 39630 90a848 39629->39630 39631 90ae43 VirtualProtectEx 39629->39631 39634 90b002 3 API calls 39629->39634 39630->38708 39633 90b3d2 39631->39633 39634->39631 39636 934bc5 39635->39636 39637 935d7d 39636->39637 39640 934f13 39636->39640 39638 935e97 ReadFile 39637->39638 39643 9350ea 2 API calls 39640->39643 39646 8f63b2 39645->39646 39647 8f6465 22 API calls 39646->39647 39648 8f63f4 VirtualAlloc 39646->39648 39647->39648 39650 8f68c9 39648->39650 39650->38708 39652 92d40e 17 API calls 39651->39652 39653 92d404 39651->39653 39652->39653 39654 92d564 16 API calls 39653->39654 39657 92d43b 39653->39657 39654->39657 39655 92da05 CloseHandle 39657->39655 39658 92db66 11 API calls 39657->39658 39671 928c04 39670->39671 39677 928d5c 10 API calls 39671->39677 39678 928cf9 39671->39678 39672 928da6 39673 928de9 39677->39678 39678->39672 39678->39673 39689 908f91 16 API calls 39688->39689 39690 908f8a VirtualAllocEx 39689->39690 39692 9093f7 39690->39692 39706 8fc79e 39704->39706 42759 8fc7a7 CreateProcessW CreateProcessW 39704->42759 39707 8fcafc CreateProcessW 39706->39707 39710 8fcaf2 39706->39710 39707->39710 39708 8fd672 CreateProcessW 39710->39708 39712 8f5cd4 39711->39712 39712->38708 39713 8f68a4 VirtualAlloc 39712->39713 39714 8f68c9 39713->39714 39714->38708 42760 927fd9 39715->42760 39719 90938b VirtualAllocEx 39718->39719 39720 9093f7 39719->39720 39721 90b409 39720->39721 39723 909416 39720->39723 39733 926a77 39 API calls 39732->39733 39738 926a6c 39733->39738 39734 926a8e CreateDirectoryW 39738->39734 39740 926d39 39738->39740 39741 926d7c 39738->39741 39749 92769b 39748->39749 39751 927768 26 API calls 39749->39751 39755 927518 39749->39755 39750 92767d 26 API calls 39752 927673 39750->39752 39751->39755 39755->39750 39755->39752 39767 8fca84 39766->39767 39768 8fcafc CreateProcessW 39767->39768 39769 8fcaf2 39767->39769 39768->39769 39770 8fd672 CreateProcessW 39769->39770 39773 933e81 39772->39773 39774 9347b8 VirtualAlloc 39773->39774 39775 9368b7 39774->39775 39776 9347df 39774->39776 39775->38708 39785 90f64d 39784->39785 39786 90fc7a WriteProcessMemory 39785->39786 39787 90fcb3 39786->39787 39787->38708 39789 933684 39788->39789 39790 9347b8 VirtualAlloc 39789->39790 39791 9368b7 39790->39791 39792 9347df 39790->39792 39791->38708 39801 92da9b 39800->39801 39802 92db66 11 API calls 39801->39802 39803 92db5e 39802->39803 39817 928a7f 39816->39817 39818 928a9b 39817->39818 39819 928adc 39817->39819 39820 928ac1 7 API calls 39818->39820 39821 928af8 12 API calls 39819->39821 39832 92d683 39831->39832 39833 92d6ff 15 API calls 39832->39833 39836 92d6f7 39832->39836 39833->39836 39834 92da05 CloseHandle 39836->39834 39837 92db66 11 API calls 39836->39837 39853 926a85 39849->39853 39850 926a8e CreateDirectoryW 39852 927e85 39850->39852 39853->39850 39856 926d39 39853->39856 39857 926d7c 39853->39857 39859 926d5b 30 API calls 39856->39859 39858 926dbe 37 API calls 39857->39858 39863 926d51 39857->39863 39858->39863 39859->39863 39863->39850 39868 92729b 39864->39868 39865 927344 42775 927372 29 API calls 39865->42775 39868->39865 39869 927303 CreateDirectoryW 39868->39869 39871 927e85 39869->39871 39875 92de7a 39874->39875 39876 92e012 10 API calls 39875->39876 39877 92e008 CloseHandle 39876->39877 39889 928a7f 39888->39889 39890 928a9b 39889->39890 39891 928adc 39889->39891 39892 928ac1 7 API calls 39890->39892 39893 928af8 12 API calls 39891->39893 39904 929699 39903->39904 39905 929729 RegOpenKeyExW 39904->39905 39908 929721 39904->39908 39905->39908 39906 92a250 RegOpenKeyExW 39908->39906 39910 92da77 39909->39910 39911 92db66 11 API calls 39910->39911 39912 92db5e 39911->39912 39926 92c950 39925->39926 39926->39925 39927 92cbdc 39926->39927 39930 92da46 39926->39930 42779 92cbfb 23 API calls 39927->42779 39931 92db66 11 API calls 39930->39931 39948 928e83 39945->39948 39946 92a250 RegOpenKeyExW 39947 92a27f 39946->39947 39947->38708 39949 9291be 6 API calls 39948->39949 39950 929137 39948->39950 39954 928e8c 39948->39954 39951 9291b4 39949->39951 39952 929729 RegOpenKeyExW 39950->39952 39950->39954 39951->39950 39953 92925e 5 API calls 39951->39953 39952->39954 39953->39950 39954->39946 39956 8fc29c CreateProcessW 39955->39956 39958 8fd69f 39956->39958 39958->38708 39960 929288 39959->39960 39961 92927e 39959->39961 39963 9293f3 39960->39963 42781 9293fd RegOpenKeyExW RegOpenKeyExW RegOpenKeyExW 39960->42781 39962 929292 2 API calls 39961->39962 39962->39960 39965 929729 RegOpenKeyExW 39963->39965 39968 929721 39963->39968 39965->39968 39966 92a250 RegOpenKeyExW 39968->39966 39970 8fca84 39969->39970 39971 8fcafc CreateProcessW 39970->39971 39974 8fcaf2 39970->39974 39971->39974 39972 8fd672 CreateProcessW 39973 8fd69f 39972->39973 39973->38708 39974->39972 39976 8f6675 39975->39976 39977 8f67c4 3 API calls 39976->39977 39978 8f678d 39976->39978 39977->39978 39979 8f6875 VirtualAlloc 39978->39979 39981 8f686a VirtualAlloc 39978->39981 39979->39981 39982 8f68c9 39981->39982 39982->38708 39984 92ee48 39983->39984 39989 92ee5e 39984->39989 39992 92ef2d 39984->39992 39985 92f24f CreateFileW 39988 930646 39985->39988 39989->39985 42784 92f4e1 39989->42784 39993 92f20a 39992->39993 39994 92f189 7 API calls 39992->39994 42782 92ef39 8 API calls 39992->42782 42783 92ef39 8 API calls 39992->42783 39995 92f232 7 API calls 39993->39995 39994->39992 39998 927e46 CreateDirectoryW 39997->39998 40000 927e85 39998->40000 42798 927ea7 19 API calls 40000->42798 40004 934e54 40003->40004 40005 934f13 40004->40005 40006 935d7d 40004->40006 40011 9350ea 2 API calls 40005->40011 40007 935e97 ReadFile 40006->40007 40008 935e8f ReadFile 40007->40008 40012 9350e0 40011->40012 40017 92727b 40013->40017 40014 927344 42799 927372 29 API calls 40014->42799 40017->40014 40018 927303 CreateDirectoryW 40017->40018 40020 927e85 40018->40020 42800 927ea7 19 API calls 40020->42800 40024 929288 40023->40024 40025 92927e 40023->40025 40029 9293f3 40024->40029 42801 9293fd RegOpenKeyExW RegOpenKeyExW RegOpenKeyExW 40024->42801 40026 929292 2 API calls 40025->40026 40026->40024 40028 929721 40031 92a250 RegOpenKeyExW 40028->40031 40029->40028 40030 929729 RegOpenKeyExW 40029->40030 40030->40028 40037 928e78 40033->40037 40034 928e8c 40035 92a250 RegOpenKeyExW 40034->40035 40036 92a27f 40035->40036 40036->38708 40037->40034 40038 9291be 6 API calls 40037->40038 40042 929137 40037->40042 40039 9291b4 40038->40039 40041 92925e 5 API calls 40039->40041 40039->40042 40040 929729 RegOpenKeyExW 40040->40034 40041->40042 40042->40034 40042->40040 40044 929676 2 API calls 40043->40044 40045 92966f 40044->40045 40046 929729 RegOpenKeyExW 40045->40046 40049 929721 40045->40049 40046->40049 40047 92a250 RegOpenKeyExW 40049->40047 40051 933660 40050->40051 40052 9347b8 VirtualAlloc 40051->40052 40053 9368b7 40052->40053 40054 9347df 40052->40054 40053->38708 40055 935d7d 40054->40055 40058 934f13 40054->40058 40063 92d652 40062->40063 40064 92d6ff 15 API calls 40063->40064 40068 92d6f7 40063->40068 40064->40068 40065 92da05 CloseHandle 40067 92e581 40065->40067 40068->40065 40069 92db66 11 API calls 40068->40069 40070 92db5e 40069->40070 40081 92a244 RegOpenKeyExW 40080->40081 40083 92a27f 40081->40083 40083->38708 40085 90a2c1 40084->40085 40091 90a27e 40084->40091 40086 90a3a6 8 API calls 40085->40086 40085->40091 40086->40091 40087 90a848 40087->38708 40088 90ae43 VirtualProtectEx 40090 90b3d2 40088->40090 40091->40087 40091->40088 40092 90b002 3 API calls 40091->40092 40092->40088 40095 92d187 40093->40095 40094 92d190 CloseHandle 40102 92e581 40094->40102 40095->40094 40097 92d40e 17 API calls 40095->40097 40098 92d404 40097->40098 40099 92d564 16 API calls 40098->40099 40100 92d43b 40098->40100 40099->40100 40100->40094 40103 92fb05 40102->40103 40104 92ec9a 40102->40104 40114 92864b 40113->40114 40115 9287ed 40114->40115 40116 92884e 16 API calls 40114->40116 40117 9288d7 40115->40117 40120 929742 40115->40120 40116->40115 42804 9288f1 14 API calls 40117->42804 40121 92a250 RegOpenKeyExW 40120->40121 40124 926a2a 40123->40124 40125 926a49 40124->40125 40126 926778 40124->40126 40127 926a64 40 API calls 40125->40127 42805 9267a0 45 API calls 40126->42805 40134 926a5c 40127->40134 40148 92729b 40144->40148 40145 927344 42808 927372 29 API calls 40145->42808 40148->40145 40149 927303 CreateDirectoryW 40148->40149 40151 927e85 40149->40151 40156 93aa2f WriteFile 40154->40156 40157 93aad0 40156->40157 40157->38708 40162 927241 40158->40162 40159 927344 42810 927372 29 API calls 40159->42810 40162->40159 40163 927303 CreateDirectoryW 40162->40163 40165 927e85 40163->40165 40169 90ee78 40168->40169 40170 90ef71 6 API calls 40169->40170 40171 90ef77 40169->40171 40170->40169 40172 90efd4 5 API calls 40171->40172 40173 90efa3 40171->40173 40172->40173 40185 92fcd9 40182->40185 40184 92fdcc 40186 9300d8 CreateFileW 40184->40186 40185->40184 42812 92fdd6 CreateFileW CreateFileW 40185->42812 40191 90c679 40190->40191 40192 90c7f6 2 API calls 40191->40192 40193 90c7b9 40191->40193 40192->40193 40194 90c92c 40193->40194 40197 90c96d 40193->40197 40201 929e3c RegOpenKeyExW 40200->40201 40203 92a27f 40201->40203 40203->38708 40205 92e558 CloseHandle 40204->40205 40206 92e581 40205->40206 40207 92fb05 40206->40207 40208 92ec9a 40206->40208 40216 8fd644 CreateProcessW 40215->40216 40218 8fd69f 40216->40218 40218->38708 40221 92f246 40219->40221 40223 92f4e1 6 API calls 40221->40223 40224 92f24f CreateFileW 40221->40224 40222 930646 40223->40224 40224->40222 40226 92720c 40225->40226 40227 927227 30 API calls 40226->40227 40228 92721d 40227->40228 40238 927a30 40237->40238 40241 927a3c 40237->40241 40239 927a46 20 API calls 40238->40239 40239->40241 40240 927b64 CreateDirectoryW 40243 927e85 40240->40243 40241->40240 42816 927b6e 20 API calls 40241->42816 40248 926e1b 40247->40248 40249 926e25 30 API calls 40247->40249 40250 926ec3 40248->40250 40251 926e80 40248->40251 40249->40248 40252 926f2f 33 API calls 40250->40252 40253 926ea8 30 API calls 40251->40253 40264 92de1e 40263->40264 40265 92e012 10 API calls 40264->40265 40266 92e008 CloseHandle 40265->40266 40278 933e10 40277->40278 40279 9347b8 VirtualAlloc 40278->40279 40280 9368b7 40279->40280 40281 9347df 40279->40281 40280->38708 40290 92ce11 40289->40290 40291 92ce6e 40290->40291 40292 92ce2d 40290->40292 42821 92ce94 20 API calls 40291->42821 40293 92ce53 18 API calls 40292->40293 40322 92de0e 40321->40322 40323 92e012 10 API calls 40322->40323 40324 92e008 CloseHandle 40323->40324 40337 929220 40335->40337 40336 929721 40339 92a250 RegOpenKeyExW 40336->40339 40337->40336 40338 929729 RegOpenKeyExW 40337->40338 40338->40336 40342 928e47 40341->40342 40343 928e37 40341->40343 40345 928e58 7 API calls 40342->40345 40343->40342 40344 928b76 40343->40344 40346 928b84 10 API calls 40344->40346 40347 928e51 40345->40347 40366 92a21e RegOpenKeyExW 40365->40366 40368 92a27f 40366->40368 40368->38708 40370 929214 40369->40370 40371 929729 RegOpenKeyExW 40370->40371 40374 929721 40370->40374 40371->40374 40372 92a250 RegOpenKeyExW 40374->40372 40376 90ee24 7 API calls 40375->40376 40377 90ee1c 40375->40377 40376->40377 40378 90ef71 6 API calls 40377->40378 40379 90ef77 40377->40379 40378->40377 40380 90efd4 5 API calls 40379->40380 40381 90efa3 40379->40381 40380->40381 40391 929e13 RegOpenKeyExW 40390->40391 40393 92a27f 40391->40393 40393->38708 40395 8fd650 CreateProcessW 40394->40395 40397 8fd69f 40395->40397 40397->38708 40399 92c72a 40398->40399 40400 92cbdc 40399->40400 40403 92da46 40399->40403 42824 92cbfb 23 API calls 40400->42824 40404 92db66 11 API calls 40403->40404 40419 92d789 40418->40419 40421 92d7d4 14 API calls 40419->40421 40422 92d7cd 40419->40422 40420 92d892 40421->40422 40422->40420 40424 92d921 13 API calls 40422->40424 40424->40420 40441 928b6a 40440->40441 40446 928b29 40440->40446 40442 928b84 11 API calls 40441->40442 40453 928b7c 40442->40453 40443 928e8c 40444 92a250 RegOpenKeyExW 40443->40444 40446->40443 40448 9291be 6 API calls 40446->40448 40454 929137 40446->40454 40455 9291b4 40448->40455 40454->40443 40458 929729 RegOpenKeyExW 40454->40458 40455->40454 40458->40443 40461 933bfc 40460->40461 40462 9347b8 VirtualAlloc 40461->40462 40463 9368b7 40462->40463 40464 9347df 40462->40464 40463->38708 40473 934f06 40472->40473 40474 935d7d 40473->40474 40477 934f13 40473->40477 40475 935e97 ReadFile 40474->40475 40480 9350ea 2 API calls 40477->40480 40483 930618 CreateFileW 40482->40483 40484 930646 40483->40484 40486 9272d9 40485->40486 40487 927303 CreateDirectoryW 40486->40487 40488 927344 40486->40488 40491 927e85 40487->40491 42827 927372 29 API calls 40488->42827 40498 926a85 40495->40498 40497 927e85 40501 926d39 40498->40501 40502 926d7c 40498->40502 40509 926a8e CreateDirectoryW 40498->40509 40504 926d5b 30 API calls 40501->40504 40503 926dbe 37 API calls 40502->40503 40508 926d51 40502->40508 40503->40508 40504->40508 40508->40509 40509->40497 40511 90b6e4 40510->40511 40512 90baee 40511->40512 40515 90c96d 40511->40515 42831 90bb1c 8 API calls 40512->42831 40516 90d48f VirtualAlloc 40515->40516 40522 928e83 40518->40522 40519 928e8c 40520 92a250 RegOpenKeyExW 40519->40520 40522->40519 40523 9291be 6 API calls 40522->40523 40524 929137 40522->40524 40525 9291b4 40523->40525 40524->40519 40526 929729 RegOpenKeyExW 40524->40526 40525->40524 40526->40519 40529 92fae2 40528->40529 40530 92faf2 CreateFileW 40529->40530 40531 92fae7 CreateFileW 40530->40531 40535 92fadd 40534->40535 40536 92faf2 CreateFileW 40535->40536 40537 92fae7 CreateFileW 40536->40537 40541 92dc19 40540->40541 40542 92e012 10 API calls 40541->40542 40543 92e008 CloseHandle 40542->40543 40555 92fadd 40554->40555 40556 92faf2 CreateFileW 40555->40556 40557 92fae7 CreateFileW 40556->40557 40561 92dadb 40560->40561 40562 92db66 11 API calls 40561->40562 40563 92db5e 40562->40563 40580 92729b 40576->40580 40577 927344 42834 927372 29 API calls 40577->42834 40580->40577 40581 927303 CreateDirectoryW 40580->40581 40583 927e85 40581->40583 40590 92fcd9 40586->40590 40587 92fdcc 40588 9300d8 CreateFileW 40587->40588 40590->40587 42836 92fdd6 CreateFileW CreateFileW 40590->42836 40595 9347ac VirtualAlloc 40594->40595 40597 9368b7 40595->40597 40598 9347df 40595->40598 40597->38708 40599 935d7d 40598->40599 40602 934f13 40598->40602 40607 92cab1 40606->40607 40608 92cbdc 40607->40608 40611 92da46 40607->40611 42837 92cbfb 23 API calls 40608->42837 40612 92db66 11 API calls 40611->40612 40627 93a6b1 WriteFile 40626->40627 40629 93aad0 40627->40629 40629->38708 40631 9272d1 40630->40631 40632 927303 CreateDirectoryW 40631->40632 40633 927344 40631->40633 40636 927e85 40632->40636 42839 927372 29 API calls 40633->42839 40648 934bf9 40640->40648 40651 934e35 40640->40651 40641 935d7d 40642 935e97 ReadFile 40641->40642 40644 934f13 40647 9350ea 2 API calls 40644->40647 40650 934e40 4 API calls 40648->40650 40648->40651 40650->40651 40651->40641 40651->40644 40655 92ee8f 40652->40655 40654 930646 40656 92f4e1 6 API calls 40655->40656 40657 92f24f CreateFileW 40655->40657 40656->40657 40657->40654 40659 8fd650 CreateProcessW 40658->40659 40661 8fd69f 40659->40661 40661->38708 40663 933ea4 40662->40663 40664 9347b8 VirtualAlloc 40663->40664 40665 9368b7 40664->40665 40666 9347df 40664->40666 40665->38708 40675 9336a1 40674->40675 40676 9347b8 VirtualAlloc 40675->40676 40677 9368b7 40676->40677 40678 9347df 40676->40678 40677->38708 40687 928eb7 RegOpenKeyExW 40686->40687 40689 92a27f 40687->40689 40689->38708 40691 8fcae8 40690->40691 40692 8fcaf2 40691->40692 40693 8fcafc CreateProcessW 40691->40693 40694 8fd672 CreateProcessW 40692->40694 40693->40692 40697 93625d ReadFile 40696->40697 40699 9368b7 40697->40699 40699->38708 40701 92c701 40700->40701 40702 92cbdc 40701->40702 40705 92da46 40701->40705 42841 92cbfb 23 API calls 40702->42841 40706 92db66 11 API calls 40705->40706 40721 929699 40720->40721 40722 929729 RegOpenKeyExW 40721->40722 40725 929721 40721->40725 40722->40725 40723 92a250 RegOpenKeyExW 40725->40723 40729 92d99d 40726->40729 40727 92da05 CloseHandle 40733 92e581 40727->40733 40729->40727 40730 92db66 11 API calls 40729->40730 40731 92db5e 40730->40731 40743 93060c CreateFileW 40742->40743 40745 930646 40743->40745 40747 934d7c 40746->40747 40748 934e40 4 API calls 40747->40748 40749 934e35 40748->40749 40759 92697d 40758->40759 40760 9269eb 40759->40760 40761 9269a8 40759->40761 40763 926a49 40760->40763 40764 926778 40760->40764 40762 9269b5 41 API calls 40761->40762 40783 92719f 40782->40783 40788 927190 40782->40788 40784 9271c5 31 API calls 40783->40784 40784->40788 40785 927344 42847 927372 29 API calls 40785->42847 40788->40785 40789 927303 CreateDirectoryW 40788->40789 40791 927e85 40789->40791 40795 92d5c5 40794->40795 40799 92d582 40794->40799 40796 92d6ff 15 API calls 40795->40796 40795->40799 40796->40799 40797 92da05 CloseHandle 40803 92e581 40797->40803 40799->40797 40800 92db66 11 API calls 40799->40800 40801 92db5e 40800->40801 40813 92cda5 40812->40813 40814 92cd9f 40812->40814 40816 92ce6e 40813->40816 40817 92ce2d 40813->40817 40815 92cdad 18 API calls 40814->40815 40815->40813 42850 92ce94 20 API calls 40816->42850 40818 92ce53 18 API calls 40817->40818 40847 90b182 40846->40847 40848 90b3ac VirtualProtectEx 40847->40848 40849 90b3d2 40848->40849 40851 8f59ba 40850->40851 40852 8f5c4e VirtualAlloc 40851->40852 40855 8f5bc9 40851->40855 40852->40855 40853 8f68a4 VirtualAlloc 40855->38708 40855->40853 40858 92d187 40856->40858 40857 92d190 CloseHandle 40865 92e581 40857->40865 40858->40857 40860 92d40e 17 API calls 40858->40860 40861 92d404 40860->40861 40877 8f657e 40876->40877 40878 8f688c VirtualAlloc 40877->40878 40879 8f6593 40877->40879 40885 8f68c9 40878->40885 42853 8f65fd VirtualAlloc VirtualAlloc VirtualAlloc VirtualAlloc 40879->42853 40885->38708 40887 90d48f VirtualAlloc 40886->40887 40888 90d4c8 40887->40888 40888->38708 40890 928554 40889->40890 40891 928570 40890->40891 40897 9285b1 40890->40897 40892 928580 15 API calls 40891->40892 40893 928576 40892->40893 40897->40893 40898 92884e 16 API calls 40897->40898 40898->40893 40903 927d52 CreateDirectoryW 40902->40903 40905 927e85 40903->40905 42855 927ea7 19 API calls 40905->42855 40909 8f68a4 VirtualAlloc 40908->40909 40910 8f68c9 40909->40910 40910->38708 40912 92a244 RegOpenKeyExW 40911->40912 40914 92a27f 40912->40914 40914->38708 40916 8fd644 CreateProcessW 40915->40916 40918 8fd69f 40916->40918 40918->38708 40920 928d7b 40919->40920 40921 928da6 40920->40921 40922 928de9 40920->40922 40923 928db8 7 API calls 40921->40923 40924 928e1f 10 API calls 40922->40924 40936 92d173 18 API calls 40935->40936 40938 92d169 40935->40938 40936->40938 40939 92d40e 17 API calls 40938->40939 40955 92d190 CloseHandle 40938->40955 40940 92d404 40939->40940 40941 92e581 40955->40941 40960 92729b 40956->40960 40957 927344 42857 927372 29 API calls 40957->42857 40960->40957 40961 927303 CreateDirectoryW 40960->40961 40963 927e85 40961->40963 42858 927ea7 19 API calls 40963->42858 40967 92e54c CloseHandle 40966->40967 40969 92e581 40967->40969 40970 92fb05 40969->40970 40971 92ec9a 40969->40971 40975 92fbe5 4 API calls 40970->40975 42859 92ecb5 9 API calls 40971->42859 40979 92d14b 40978->40979 40980 92d13b 40978->40980 40982 92d173 18 API calls 40979->40982 40980->40979 40981 92ce7a 40980->40981 42860 92ce94 20 API calls 40981->42860 40985 92d169 40982->40985 40988 92d40e 17 API calls 40985->40988 41009 92d190 CloseHandle 40985->41009 41011 928535 41010->41011 41012 928570 41011->41012 41013 9285b1 41011->41013 41014 928580 15 API calls 41012->41014 41018 928576 41013->41018 41019 92884e 16 API calls 41013->41019 41014->41018 41015 9288d7 41018->41015 41020 929742 41018->41020 41019->41018 41024 8fca84 41023->41024 41025 8fcafc CreateProcessW 41024->41025 41028 8fcaf2 41024->41028 41025->41028 41026 8fd672 CreateProcessW 41027 8fd69f 41026->41027 41027->38708 41028->41026 41030 935164 ReadFile 41029->41030 41032 9368b7 41030->41032 41032->38708 41034 92d943 41033->41034 41035 92d96c 12 API calls 41034->41035 41038 92d964 41034->41038 41035->41038 41036 92da05 CloseHandle 41042 92e581 41036->41042 41038->41036 41039 92db66 11 API calls 41038->41039 41040 92db5e 41039->41040 41052 90c5aa 41051->41052 41053 90c63a 3 API calls 41052->41053 41054 90c632 41052->41054 41053->41054 41055 90c92c 41054->41055 41058 90c96d 41054->41058 41056 90c94e VirtualAlloc 41055->41056 41059 90d48f VirtualAlloc 41058->41059 41062 928d40 41061->41062 41063 928d5c 11 API calls 41062->41063 41064 928d53 41063->41064 41065 928da6 41064->41065 41066 928de9 41064->41066 41080 90f147 WriteProcessMemory 41079->41080 41082 90fcb3 41080->41082 41082->38708 41084 8fc678 41083->41084 41085 8fcafc CreateProcessW 41084->41085 41088 8fcaf2 41084->41088 41085->41088 41086 8fd672 CreateProcessW 41087 8fd69f 41086->41087 41087->38708 41088->41086 41090 933e79 41089->41090 41091 9347b8 VirtualAlloc 41090->41091 41092 9347df 41091->41092 41098 9368b7 41091->41098 41093 935d7d 41092->41093 41096 934f13 41092->41096 41098->38708 41102 92753d 41101->41102 41103 92767d 27 API calls 41102->41103 41104 927673 41103->41104 41105 927846 25 API calls 41104->41105 41118 927538 41117->41118 41119 92767d 27 API calls 41118->41119 41120 927673 41119->41120 41121 927846 25 API calls 41120->41121 41134 928554 41133->41134 41135 928570 41134->41135 41142 9285b1 41134->41142 41136 928580 15 API calls 41135->41136 41137 928576 41136->41137 41138 929742 41137->41138 41139 9288d7 41137->41139 41142->41137 41143 92884e 16 API calls 41142->41143 41143->41137 41147 92e156 CloseHandle 41146->41147 41149 92e581 41147->41149 41150 92fb05 41149->41150 41151 92ec9a 41149->41151 41155 92fbe5 4 API calls 41150->41155 42869 92ecb5 9 API calls 41151->42869 41159 8fc53f 41158->41159 41160 8fcafc CreateProcessW 41159->41160 41161 8fcaf2 41159->41161 41160->41161 41162 8fd672 CreateProcessW 41161->41162 41165 928535 41164->41165 41166 928570 41165->41166 41172 9285b1 41165->41172 41167 928580 15 API calls 41166->41167 41168 928576 41167->41168 41172->41168 41173 92884e 16 API calls 41172->41173 41173->41168 41180 92d511 41177->41180 41178 92da05 CloseHandle 41184 92e581 41178->41184 41180->41178 41181 92db66 11 API calls 41180->41181 41182 92db5e 41181->41182 41194 90a559 41193->41194 42872 90a5a1 41194->42872 41203 92910d 41202->41203 41204 9291be 6 API calls 41203->41204 41206 929137 41203->41206 41205 9291b4 41204->41205 41205->41206 41207 929729 RegOpenKeyExW 41206->41207 41211 929721 41206->41211 41207->41211 41213 93060c CreateFileW 41212->41213 41215 930646 41213->41215 41217 9354be ReadFile 41216->41217 41219 9368b7 41217->41219 41219->38708 41221 909d39 41220->41221 41222 909da6 2 API calls 41221->41222 41224 909e34 41221->41224 41222->41221 41223 909f4d 2 API calls 41224->41223 41228 909eed 41224->41228 41235 927908 CreateDirectoryW 41234->41235 41237 927e85 41235->41237 42877 927ea7 19 API calls 41237->42877 41241 929d0d RegOpenKeyExW 41240->41241 41243 92a27f 41241->41243 41243->38708 41245 8fc565 41244->41245 41247 8fc522 41244->41247 41246 8fc5f6 2 API calls 41245->41246 41245->41247 41248 8fc5ec 41245->41248 41246->41248 41249 8fcafc CreateProcessW 41247->41249 41253 8fcaf2 41247->41253 41248->41247 42878 8fc7a7 CreateProcessW CreateProcessW 41248->42878 41249->41253 41251 8fd672 CreateProcessW 41253->41251 41255 927525 41254->41255 41256 92767d 27 API calls 41255->41256 41257 927673 41256->41257 41271 8f657e 41270->41271 41272 8f688c VirtualAlloc 41271->41272 41273 8f6593 41271->41273 41279 8f68c9 41272->41279 42881 8f65fd VirtualAlloc VirtualAlloc VirtualAlloc VirtualAlloc 41273->42881 41279->38708 41283 8f5d0c 41280->41283 41281 8f68a4 VirtualAlloc 41282 8f68c9 41281->41282 41282->38708 41283->38708 41283->41281 41287 92d99d 41284->41287 41285 92da05 CloseHandle 41291 92e581 41285->41291 41287->41285 41288 92db66 11 API calls 41287->41288 41289 92db5e 41288->41289 41301 933660 41300->41301 41302 9347b8 VirtualAlloc 41301->41302 41303 9347df 41302->41303 41309 9368b7 41302->41309 41309->38708 41314 8fca84 41312->41314 41313 8fcaf2 41316 8fd672 CreateProcessW 41313->41316 41314->41313 41315 8fcafc CreateProcessW 41314->41315 41315->41313 41319 92a21e RegOpenKeyExW 41318->41319 41321 92a27f 41319->41321 41321->38708 41323 934de6 41322->41323 41324 934e40 4 API calls 41323->41324 41325 934e35 41324->41325 41335 92ee48 41334->41335 41340 92ee5e 41335->41340 41341 92ef2d 41335->41341 41336 92f24f CreateFileW 41340->41336 41342 92f4e1 6 API calls 41340->41342 41344 92f20a 41341->41344 41345 92f189 7 API calls 41341->41345 42883 92ef39 8 API calls 41341->42883 42884 92ef39 8 API calls 41341->42884 41342->41336 41345->41341 41349 929e13 RegOpenKeyExW 41348->41349 41351 92a27f 41349->41351 41351->38708 41353 8fd644 CreateProcessW 41352->41353 41355 8fd69f 41353->41355 41355->38708 41357 9341f8 41356->41357 41358 9347b8 VirtualAlloc 41357->41358 41359 9368b7 41358->41359 41360 9347df 41358->41360 41359->38708 41369 927e46 CreateDirectoryW 41368->41369 41371 927e85 41369->41371 42885 927ea7 19 API calls 41371->42885 41377 928e83 41374->41377 41375 92a250 RegOpenKeyExW 41378 9291be 6 API calls 41377->41378 41379 929137 41377->41379 41383 928e8c 41377->41383 41380 9291b4 41378->41380 41381 929729 RegOpenKeyExW 41379->41381 41379->41383 41380->41379 41381->41383 41383->41375 41385 934a49 41384->41385 41386 935d7d 41385->41386 41389 934f13 41385->41389 41387 935e97 ReadFile 41386->41387 41392 9350ea 2 API calls 41389->41392 41395 90ae43 VirtualProtectEx 41394->41395 41398 90ae86 41394->41398 41397 90b3d2 41395->41397 41398->41395 41399 90b002 3 API calls 41398->41399 41399->41395 41401 90edda 41400->41401 41402 90ee12 8 API calls 41401->41402 41403 90ee0a 41402->41403 41419 927205 41418->41419 41424 9271f9 41418->41424 41420 927227 30 API calls 41419->41420 41420->41424 41421 927344 42886 927372 29 API calls 41421->42886 41424->41421 41425 927303 CreateDirectoryW 41424->41425 41427 927e85 41425->41427 41431 9301f1 CreateFileW 41430->41431 41433 930646 41431->41433 41435 9269d6 39 API calls 41434->41435 41439 9269cf 41435->41439 41441 926d39 41439->41441 41442 926d7c 41439->41442 41449 926a8e CreateDirectoryW 41439->41449 41451 92dddd 41450->41451 41453 92dca7 41450->41453 41452 92de02 11 API calls 41451->41452 41452->41453 41454 92e012 10 API calls 41453->41454 41455 92e008 CloseHandle 41454->41455 41467 934dcd 41466->41467 41468 934e40 4 API calls 41467->41468 41469 934e35 41468->41469 41479 908e2e VirtualAllocEx 41478->41479 41483 908e71 41478->41483 41481 9093f7 41479->41481 41482 909416 41481->41482 41485 90b409 41481->41485 41483->41479 41484 908f7b 41483->41484 41487 908f82 17 API calls 41483->41487 41484->41479 41491 90908b 41484->41491 41487->41484 41502 93aa00 WriteFile 41501->41502 41503 93aa0c 41501->41503 41506 93aad0 41502->41506 41504 93aa24 WriteFile 41503->41504 41504->41502 41506->38708 41511 926a85 41507->41511 41508 926a8e CreateDirectoryW 41510 927e85 41508->41510 41511->41508 41514 926d39 41511->41514 41515 926d7c 41511->41515 41517 926d5b 30 API calls 41514->41517 41516 926dbe 37 API calls 41515->41516 41521 926d51 41515->41521 41516->41521 41517->41521 41521->41508 41523 8fd1d6 CreateProcessW 41522->41523 41525 8fd69f 41523->41525 41525->38708 41527 92d187 41526->41527 41529 92d40e 17 API calls 41527->41529 41532 92d190 CloseHandle 41527->41532 41530 92d404 41529->41530 41535 92e581 41532->41535 41547 8fd1d6 CreateProcessW 41546->41547 41549 8fd69f 41547->41549 41549->38708 41551 92d1b2 CloseHandle 41550->41551 41553 92e581 41551->41553 41554 92fb05 41553->41554 41555 92ec9a 41553->41555 41563 9341c8 41562->41563 41564 9347b8 VirtualAlloc 41563->41564 41565 9347df 41564->41565 41571 9368b7 41564->41571 41571->38708 41575 92a244 RegOpenKeyExW 41574->41575 41577 92a27f 41575->41577 41577->38708 41579 909d39 41578->41579 41583 909e34 41578->41583 41579->41578 41580 909da6 2 API calls 41579->41580 41579->41583 41580->41579 41581 909f4d 2 API calls 41582 909f44 41581->41582 41586 909eed 41582->41586 41583->41581 41583->41586 41588 90b3ac VirtualProtectEx 41586->41588 41593 90cbd0 41592->41593 41594 90d48f VirtualAlloc 41593->41594 41595 90d4c8 41594->41595 41595->38708 41597 934c87 41596->41597 41598 934e40 4 API calls 41597->41598 41599 934e35 41598->41599 41609 8f5dcb 41608->41609 41609->38708 41610 8f68a4 VirtualAlloc 41609->41610 41611 8f68c9 41610->41611 41611->38708 41613 909fd6 41612->41613 41614 90b3ac VirtualProtectEx 41613->41614 41615 90b3d2 41614->41615 41615->41615 41617 926df7 41616->41617 41618 926e1b 41616->41618 41621 926e07 36 API calls 41617->41621 41619 926ec3 41618->41619 41620 926e80 41618->41620 41622 926f2f 33 API calls 41619->41622 41625 926ea8 30 API calls 41620->41625 41623 926dfd 41621->41623 41636 929238 41635->41636 41638 9291f5 41635->41638 41637 92925e 5 API calls 41636->41637 41637->41638 41639 929729 RegOpenKeyExW 41638->41639 41642 929721 41638->41642 41639->41642 41640 92a250 RegOpenKeyExW 41642->41640 41644 9269c7 40 API calls 41643->41644 41649 9269bd 41644->41649 41645 926a8e CreateDirectoryW 41649->41645 41651 926d39 41649->41651 41652 926d7c 41649->41652 41660 92d1bb CloseHandle 41659->41660 41662 92e581 41660->41662 41663 92fb05 41662->41663 41664 92ec9a 41662->41664 41672 8f59ba 41671->41672 41673 8f5c4e VirtualAlloc 41672->41673 41676 8f5bc9 41672->41676 41673->41676 41674 8f68a4 VirtualAlloc 41676->38708 41676->41674 41678 93060c CreateFileW 41677->41678 41680 930646 41678->41680 41682 8f5d98 41681->41682 41682->38708 41683 8f68a4 VirtualAlloc 41682->41683 41684 8f68c9 41683->41684 41684->38708 41689 92f194 41685->41689 41686 92f24f CreateFileW 41688 930646 41686->41688 41689->41686 41690 92f4e1 6 API calls 41689->41690 41690->41686 41692 92f194 41691->41692 41695 92f4e1 6 API calls 41692->41695 41696 92f24f CreateFileW 41692->41696 41694 930646 41695->41696 41696->41694 41700 92d58c 41697->41700 41698 92da05 CloseHandle 41704 92e581 41698->41704 41700->41698 41701 92db66 11 API calls 41700->41701 41702 92db5e 41701->41702 41714 8fc5a0 41713->41714 41715 8fc5f6 2 API calls 41714->41715 41716 8fc5ec 41714->41716 41715->41716 41718 8fc669 41716->41718 42905 8fc7a7 CreateProcessW CreateProcessW 41716->42905 41724 933d9e 41723->41724 41725 9347b8 VirtualAlloc 41724->41725 41726 9347df 41725->41726 41732 9368b7 41725->41732 41732->38708 41736 9288ca 41735->41736 41737 929742 41736->41737 41738 9288d7 41736->41738 41741 92a250 RegOpenKeyExW 41737->41741 42906 9288f1 14 API calls 41738->42906 41744 9095ff 41743->41744 41745 909640 41743->41745 41749 909a09 41744->41749 41750 90b002 3 API calls 41744->41750 41745->41744 41746 90984b 5 API calls 41745->41746 41746->41744 41747 90b3ac VirtualProtectEx 41749->41747 41750->41749 41752 8f5d91 41751->41752 41752->38708 41753 8f68a4 VirtualAlloc 41752->41753 41754 8f68c9 41753->41754 41754->38708 41756 927596 41755->41756 41757 92767d 27 API calls 41756->41757 41758 927673 41757->41758 41772 9096da 41771->41772 41777 909840 41771->41777 41773 90984b 4 API calls 41772->41773 41772->41777 41773->41777 41774 90b3ac VirtualProtectEx 41776 909a09 41776->41774 41777->41776 41778 90b002 3 API calls 41777->41778 41778->41776 41783 928c04 41779->41783 41780 928da6 41781 928de9 41786 928d5c 11 API calls 41783->41786 41787 928cf9 41783->41787 41786->41787 41787->41780 41787->41781 41798 8f6898 VirtualAlloc 41797->41798 41800 8f68c9 41798->41800 41800->38708 41802 927c28 CreateDirectoryW 41801->41802 41804 927e85 41802->41804 42909 927ea7 19 API calls 41804->42909 41810 928c04 41807->41810 41808 928da6 41809 928de9 41814 928d5c 11 API calls 41810->41814 41815 928cf9 41810->41815 41814->41815 41815->41808 41815->41809 41826 8fcc92 CreateProcessW 41825->41826 41828 8fd69f 41826->41828 41828->38708 41830 8f6898 VirtualAlloc 41829->41830 41832 8f68c9 41830->41832 41832->38708 41834 934094 41833->41834 41835 9347b8 VirtualAlloc 41834->41835 41836 9347df 41835->41836 41842 9368b7 41835->41842 41842->38708 41846 90ec93 41845->41846 41848 90eca5 41845->41848 41847 90ecaf 4 API calls 41846->41847 41847->41848 41849 90edc8 9 API calls 41848->41849 41863 90efa3 41848->41863 41850 90edc1 41849->41850 41851 90f0bb 41857 90f157 41863->41851 41863->41857 41868 8f647d VirtualAlloc 41867->41868 41869 8f64c0 41867->41869 41873 8f68c9 41868->41873 42910 8f64e3 41869->42910 41873->38708 41882 8fd089 CreateProcessW 41881->41882 41884 8fd69f 41882->41884 41884->38708 41886 927c28 CreateDirectoryW 41885->41886 41888 927e85 41886->41888 42914 927ea7 19 API calls 41888->42914 41892 9284e2 41891->41892 41895 928523 41891->41895 41893 929742 41892->41893 41894 9288d7 41892->41894 41902 92a250 RegOpenKeyExW 41893->41902 42915 9288f1 14 API calls 41894->42915 41898 928570 41895->41898 41899 9285b1 41895->41899 41900 928580 15 API calls 41898->41900 41899->41892 41901 92884e 16 API calls 41899->41901 41900->41892 41901->41892 41905 934c87 41904->41905 41906 934e40 4 API calls 41905->41906 41907 934e35 41906->41907 41917 92c476 RegSetValueExW 41916->41917 41918 92c5f9 41917->41918 41919 92cbdc 41918->41919 41922 92da46 41918->41922 41938 92fccd 41937->41938 41942 92fc8c 41937->41942 42918 92fdd6 CreateFileW CreateFileW 41938->42918 41939 9300d8 CreateFileW 41940 9300cf CreateFileW 41939->41940 41942->41939 41946 928859 41945->41946 41947 92888e 41946->41947 41953 9285bd 41946->41953 41948 92889c 15 API calls 41947->41948 41949 9287ed 41948->41949 41953->41949 41954 92884e 15 API calls 41953->41954 41954->41949 41960 909866 41958->41960 41959 909992 4 API calls 41961 9096da 41959->41961 41960->41959 41960->41961 41963 909840 41960->41963 41962 90984b 4 API calls 41961->41962 41961->41963 41962->41963 41966 909a09 41963->41966 41967 90b002 3 API calls 41963->41967 41967->41966 41969 92f4d2 41968->41969 41970 92f4e1 6 API calls 41969->41970 41971 92f4d7 CreateFileW 41970->41971 41975 90f054 41974->41975 41976 90f0bb 41975->41976 41979 90f157 41975->41979 41977 90f0d5 3 API calls 41976->41977 41980 90f27e WriteProcessMemory 41979->41980 41985 92e54c CloseHandle 41984->41985 41987 92e581 41985->41987 41988 92fb05 41987->41988 41989 92ec9a 41987->41989 41993 92fbe5 4 API calls 41988->41993 42920 92ecb5 9 API calls 41989->42920 41997 927856 41996->41997 41998 9278e9 41997->41998 41999 92792c 41997->41999 42000 9278fc 20 API calls 41998->42000 42003 927943 CreateDirectoryW 41999->42003 42921 927967 23 API calls 41999->42921 42002 9278f3 42000->42002 42005 927e85 42003->42005 42009 90a44e 42008->42009 42010 90a509 5 API calls 42009->42010 42017 90a597 42009->42017 42011 90a501 42010->42011 42012 90a5a1 4 API calls 42011->42012 42012->42017 42013 90a848 42013->38708 42014 90ae43 VirtualProtectEx 42016 90b3d2 42014->42016 42017->42013 42017->42014 42018 90b002 3 API calls 42017->42018 42018->42014 42020 92c476 RegSetValueExW 42019->42020 42021 92c5f9 42020->42021 42022 92cbdc 42021->42022 42025 92da46 42021->42025 42923 92cbfb 23 API calls 42022->42923 42026 92db66 11 API calls 42025->42026 42044 90ac77 42040->42044 42041 90ae43 VirtualProtectEx 42043 90b3d2 42041->42043 42044->42041 42045 90b002 3 API calls 42044->42045 42045->42041 42047 92e0a8 CloseHandle 42046->42047 42049 92e581 42047->42049 42050 92fb05 42049->42050 42051 92ec9a 42049->42051 42055 92fbe5 4 API calls 42050->42055 42925 92ecb5 9 API calls 42051->42925 42061 92d45a 42058->42061 42059 92da05 CloseHandle 42065 92e581 42059->42065 42061->42059 42062 92db66 11 API calls 42061->42062 42063 92db5e 42062->42063 42064 92e012 10 API calls 42063->42064 42064->42059 42066 92fb05 42065->42066 42067 92ec9a 42065->42067 42075 927856 42074->42075 42076 9278e9 42075->42076 42077 92792c 42075->42077 42079 9278fc 20 API calls 42076->42079 42078 927943 CreateDirectoryW 42077->42078 42927 927967 23 API calls 42077->42927 42083 927e85 42078->42083 42081 9278f3 42079->42081 42088 8f5c57 42086->42088 42087 8f68a4 VirtualAlloc 42089 8f68c9 42087->42089 42088->38708 42088->42087 42089->38708 42091 930058 42090->42091 42092 9300d8 CreateFileW 42091->42092 42093 9300cf CreateFileW 42092->42093 42095 930646 42093->42095 42097 92888e 42096->42097 42098 92887e 42096->42098 42099 92889c 15 API calls 42097->42099 42098->42097 42105 9285bd 42098->42105 42100 9287ed 42099->42100 42101 929742 42100->42101 42102 9288d7 42100->42102 42105->42100 42106 92884e 16 API calls 42105->42106 42106->42100 42110 934c77 42109->42110 42111 934e40 4 API calls 42110->42111 42112 934e35 42111->42112 42113 935d7d 42112->42113 42117 934f13 42112->42117 42123 8f683e 42121->42123 42122 8f686a VirtualAlloc 42126 8f68c9 42122->42126 42123->42122 42124 8f6875 VirtualAlloc 42123->42124 42124->42122 42126->38708 42128 929034 42127->42128 42129 9291be 6 API calls 42128->42129 42130 929137 42128->42130 42131 9291b4 42129->42131 42132 929729 RegOpenKeyExW 42130->42132 42136 929721 42130->42136 42131->42130 42133 92925e 5 API calls 42131->42133 42132->42136 42133->42130 42134 92a250 RegOpenKeyExW 42136->42134 42138 8fd06a CreateProcessW 42137->42138 42140 8fd69f 42138->42140 42140->38708 42142 933c2e 42141->42142 42143 9347b8 VirtualAlloc 42142->42143 42144 9347df 42143->42144 42150 9368b7 42143->42150 42145 935d7d 42144->42145 42148 934f13 42144->42148 42150->38708 42157 90e49b 42153->42157 42154 90e8a1 WriteProcessMemory 42156 90fcb3 42154->42156 42156->38708 42157->42154 42158 90eb33 14 API calls 42157->42158 42158->42154 42160 927427 42159->42160 42161 9274cb 42160->42161 42165 92743d 42160->42165 42172 92750c 42160->42172 42163 9274dc 26 API calls 42161->42163 42162 927846 25 API calls 42164 92783d 42162->42164 42163->42165 42165->42162 42174 92767d 27 API calls 42172->42174 42174->42165 42179 92c875 42178->42179 42180 92cbdc 42179->42180 42183 92da46 42179->42183 42932 92cbfb 23 API calls 42180->42932 42184 92db66 11 API calls 42183->42184 42199 935449 42198->42199 42200 935482 42199->42200 42203 9351b1 42199->42203 42201 93688f ReadFile 42200->42201 42204 9353fb ReadFile 42203->42204 42207 90b08b 42206->42207 42208 90b0a0 42207->42208 42209 90b394 VirtualProtectEx 42207->42209 42211 90b172 VirtualProtectEx 42208->42211 42212 90b3d2 42209->42212 42215 930058 42214->42215 42216 9300d8 CreateFileW 42215->42216 42217 9300cf CreateFileW 42216->42217 42221 92d77a 42220->42221 42223 92d7d4 14 API calls 42221->42223 42224 92d7cd 42221->42224 42222 92d892 42223->42224 42224->42222 42226 92d921 13 API calls 42224->42226 42226->42222 42243 8fcc2f CreateProcessW 42242->42243 42245 8fd69f 42243->42245 42245->38708 42247 8fc476 42246->42247 42248 8fc5f6 2 API calls 42247->42248 42249 8fc5ec 42247->42249 42250 8fc522 42247->42250 42248->42249 42249->42250 42935 8fc7a7 CreateProcessW CreateProcessW 42249->42935 42251 8fcafc CreateProcessW 42250->42251 42253 8fcaf2 42250->42253 42251->42253 42257 92ffe6 42256->42257 42258 9300d8 CreateFileW 42257->42258 42259 9300cf CreateFileW 42258->42259 42263 92d47e 42262->42263 42264 92d43b 42262->42264 42263->42264 42265 92d564 16 API calls 42263->42265 42266 92da05 CloseHandle 42264->42266 42268 92db66 11 API calls 42264->42268 42265->42264 42271 92e581 42266->42271 42269 92db5e 42268->42269 42281 928f91 42280->42281 42282 9291be 6 API calls 42281->42282 42283 929137 42281->42283 42284 9291b4 42282->42284 42285 929729 RegOpenKeyExW 42283->42285 42286 929721 42283->42286 42284->42283 42285->42286 42291 90b013 42290->42291 42292 90b039 2 API calls 42291->42292 42293 90b02f 42292->42293 42301 90ec35 42300->42301 42302 90f0bb 42301->42302 42305 90f157 42301->42305 42303 90f0d5 3 API calls 42302->42303 42306 90f27e WriteProcessMemory 42305->42306 42311 9347b8 VirtualAlloc 42310->42311 42312 9368b7 42311->42312 42313 9347df 42311->42313 42312->38708 42314 935d7d 42313->42314 42317 934f13 42313->42317 42322 8f6830 2 API calls 42321->42322 42324 8f6826 42321->42324 42322->42324 42323 8f686a VirtualAlloc 42327 8f68c9 42323->42327 42324->42323 42325 8f6875 VirtualAlloc 42324->42325 42325->42323 42327->38708 42329 8f6411 VirtualAlloc 42328->42329 42331 8f68c9 42329->42331 42331->38708 42333 92e01b CloseHandle 42332->42333 42335 92e581 42333->42335 42336 92fb05 42335->42336 42337 92ec9a 42335->42337 42345 926913 42344->42345 42354 9268fb 42344->42354 42346 926806 42345->42346 42350 92693c 42345->42350 42939 92681a 45 API calls 42346->42939 42347 9269eb 42355 926a49 42347->42355 42356 926778 42347->42356 42348 9269a8 42352 9269b5 41 API calls 42348->42352 42351 92696a 44 API calls 42350->42351 42351->42354 42354->42347 42354->42348 42375 9274f0 42374->42375 42376 927846 25 API calls 42375->42376 42377 92783d 42376->42377 42389 934ced 42388->42389 42390 934e40 4 API calls 42389->42390 42391 934e35 42390->42391 42401 935104 ReadFile 42400->42401 42402 9350fa ReadFile 42401->42402 42404 9368b7 42402->42404 42404->38708 42406 90d48f VirtualAlloc 42405->42406 42407 90d4c8 42406->42407 42407->38708 42409 927c28 CreateDirectoryW 42408->42409 42411 927e85 42409->42411 42944 927ea7 19 API calls 42411->42944 42415 927908 CreateDirectoryW 42414->42415 42417 927e85 42415->42417 42945 927ea7 19 API calls 42417->42945 42421 934d02 42420->42421 42422 934e40 4 API calls 42421->42422 42423 934e35 42422->42423 42433 935d12 42432->42433 42434 935d3c ReadFile 42433->42434 42437 935e97 ReadFile 42433->42437 42436 9368b7 42434->42436 42436->38708 42437->42434 42439 9290fc 42438->42439 42440 9291be 6 API calls 42439->42440 42442 929137 42439->42442 42443 9291b4 42440->42443 42441 929721 42442->42441 42444 929729 RegOpenKeyExW 42442->42444 42443->42442 42444->42441 42449 934cf4 42448->42449 42450 934e40 4 API calls 42449->42450 42451 934e35 42450->42451 42461 8fd644 CreateProcessW 42460->42461 42463 8fd69f 42461->42463 42463->38708 42465 92e54c CloseHandle 42464->42465 42467 92e581 42465->42467 42468 92fb05 42467->42468 42469 92ec9a 42467->42469 42479 8f58e4 42476->42479 42477 8f68a4 VirtualAlloc 42478 8f68c9 42477->42478 42478->38708 42479->38708 42479->42477 42481 8f68a4 VirtualAlloc 42480->42481 42482 8f68c9 42481->42482 42482->38708 42488 928c04 42483->42488 42491 928cf9 42483->42491 42484 928da6 42486 928db8 7 API calls 42484->42486 42485 928de9 42487 928e1f 11 API calls 42485->42487 42490 928d5c 11 API calls 42488->42490 42488->42491 42490->42491 42491->42484 42491->42485 42502 9274f0 42501->42502 42503 927846 25 API calls 42502->42503 42504 92783d 42503->42504 42516 93060c CreateFileW 42515->42516 42518 930646 42516->42518 42520 90c8c4 42519->42520 42521 90c92c 42520->42521 42524 90c96d 42520->42524 42522 90c94e VirtualAlloc 42521->42522 42525 90d48f VirtualAlloc 42524->42525 42528 90f112 42527->42528 42529 90f116 42528->42529 42533 90f157 42528->42533 42530 90f13d WriteProcessMemory 42529->42530 42534 90f27e WriteProcessMemory 42533->42534 42537 92dcd8 42536->42537 42538 92e012 10 API calls 42537->42538 42539 92e008 CloseHandle 42538->42539 42551 90f0ae 42550->42551 42552 90f0bb 42551->42552 42555 90f157 42551->42555 42553 90f0d5 3 API calls 42552->42553 42556 90f27e WriteProcessMemory 42555->42556 42561 92d8b5 42560->42561 42562 92d8fb 42561->42562 42563 92d921 13 API calls 42561->42563 42564 92d96c 12 API calls 42562->42564 42567 92d964 42562->42567 42563->42562 42564->42567 42581 8f54db VirtualAlloc 42580->42581 42582 8f54d3 VirtualAlloc 42581->42582 42584 8f68c9 42582->42584 42584->38708 42586 8f58a4 42585->42586 42587 8f58fc 42586->42587 42588 8f58b9 42586->42588 42951 8f593f VirtualAlloc VirtualAlloc 42587->42951 42589 8f58d2 VirtualAlloc 42588->42589 42598 9300cf CreateFileW 42597->42598 42599 9300d8 CreateFileW 42597->42599 42601 930646 42598->42601 42599->42598 42603 92d187 42602->42603 42605 92d40e 17 API calls 42603->42605 42608 92d190 CloseHandle 42603->42608 42606 92d404 42605->42606 42611 92e581 42608->42611 42623 8fd0b3 CreateProcessW 42622->42623 42625 8fd69f 42623->42625 42625->38708 42629 928c04 42626->42629 42627 928da6 42628 928de9 42633 928d5c 11 API calls 42629->42633 42634 928cf9 42629->42634 42633->42634 42634->42627 42634->42628 42645 92c894 42644->42645 42646 92cbdc 42645->42646 42649 92da46 42645->42649 42953 92cbfb 23 API calls 42646->42953 42650 92db66 11 API calls 42649->42650 42665 8f589f 42664->42665 42666 8f58fc 42665->42666 42667 8f58b9 42665->42667 42955 8f593f VirtualAlloc VirtualAlloc 42666->42955 42668 8f58d2 VirtualAlloc 42667->42668 42677 9300aa 42676->42677 42678 9300d8 CreateFileW 42677->42678 42679 9300cf CreateFileW 42678->42679 42683 9288ca 42682->42683 42684 9288d7 42683->42684 42687 929742 42683->42687 42956 9288f1 14 API calls 42684->42956 42688 92a250 RegOpenKeyExW 42687->42688 42691 8fd0b3 CreateProcessW 42690->42691 42693 8fd69f 42691->42693 42693->38708 42695 934cab 42694->42695 42696 934e40 4 API calls 42695->42696 42697 934e35 42696->42697 42707 927c28 CreateDirectoryW 42706->42707 42709 927e85 42707->42709 42957 927ea7 19 API calls 42709->42957 42761 927fe9 42760->42761 42762 9283ff 42761->42762 42764 928409 18 API calls 42761->42764 42873 90a5bd 42872->42873 42911 8f64f4 42910->42911 42958 41a6c9 42959 41a6ef VirtualAlloc 42958->42959 42961 41a815 42959->42961 42963 41a7ac 42959->42963 42962 41a8b3 42961->42962 42968 41a86b 394 API calls 42961->42968 42969 41aa4b 394 API calls 42962->42969 42963->42963

                                    Control-flow Graph

                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: 7G3K$M$P$W$W$c$e$e$e$i$m$o$o$r$r$r$s$s$t$y
                                    • API String ID: 4275171209-2769547580
                                    • Opcode ID: 2840d8ad5d51b2ace4994d8eee50234126863668c224d8dd2e3d3f821928bae3
                                    • Instruction ID: a4b22e1dfac8553338077540796ff872636171f4612a16193f68cddb3057f368
                                    • Opcode Fuzzy Hash: 2840d8ad5d51b2ace4994d8eee50234126863668c224d8dd2e3d3f821928bae3
                                    • Instruction Fuzzy Hash: 4DE1E1B1D092A89EFB208A14DC44BEABB75EF91304F0440F9D54D9B282D2BD5ED5CF62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 84 908dd9-908e2c 85 908e71-908e86 84->85 86 908e2e-908e6c 84->86 87 908e88-908e94 85->87 88 908e99-908eea 85->88 89 90938b-9093e3 VirtualAllocEx 86->89 87->89 100 908eec-908f2a 88->100 101 908f2f-908f73 88->101 91 9093f7-909410 89->91 93 909416-909552 call 909553 91->93 94 90b409-90b410 91->94 95 90b412-917e39 94->95 96 90b449-90b48f call 90b471 94->96 122 90b495-90b4ad 96->122 123 90b490 call 90b49d 96->123 100->89 106 908f75-908f81 call 908f82 101->106 107 908fb8-909085 101->107 106->107 117 90908b-90916b call 9090e5 107->117 118 90937f-909385 107->118 131 90917c-90918d 117->131 118->89 125 90b4b3-90b4b8 122->125 126 90b4ae call 90b4bb 122->126 123->122 126->125 132 909193-9091a3 131->132 133 90922e-90927f 131->133 132->133 135 9091a9-9091fa 132->135 141 909290-9092e7 133->141 142 909281-90928b 133->142 137 909220 135->137 138 9091fc-90921e 135->138 137->131 138->137 139 909227 138->139 139->133 145 9092f5-909327 141->145 146 9092e9-9092f3 141->146 143 909331-909338 142->143 147 90937a 143->147 148 90933a-90934f call 909354 143->148 145->143 146->143 147->147 148->147
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000002), ref: 009093BF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: E$P$V$a$c$e$i$l$o$r$r$t$t$t$u$x
                                    • API String ID: 4275171209-4025948460
                                    • Opcode ID: d95b60aa00213f5eb43a2287cf35ae4aa1d40fd6b3fdf40145debedbd6467a40
                                    • Instruction ID: c4629e9d0dbf3a6c86cb510f933223b6c82638235adc6501b40651cbff437be3
                                    • Opcode Fuzzy Hash: d95b60aa00213f5eb43a2287cf35ae4aa1d40fd6b3fdf40145debedbd6467a40
                                    • Instruction Fuzzy Hash: E3F118B2D081689FE7208614DC84BEBBBB9EB81314F1481FAD94D66281D67D6FC1CF91

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNELBASE(00000041,00412E62,0041307C,00412E62,?,?,?,?,?,?,00000019,00000019,?,?,004129FE,004129FE), ref: 00413418
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: 7D52$9EBN
                                    • API String ID: 1029625771-780101925
                                    • Opcode ID: 388f1a279dd8bf3357b554f46f65a7b10d8751f4d34d2846fe6e885a3c82476a
                                    • Instruction ID: 0ad503646254e4b4fb3b36782f0a59c631594f6a4f774dda271bb14b5d07a41a
                                    • Opcode Fuzzy Hash: 388f1a279dd8bf3357b554f46f65a7b10d8751f4d34d2846fe6e885a3c82476a
                                    • Instruction Fuzzy Hash: 810227B2C181988FF724CB28CD45BEABB79EB94304F1441FAD40D96181D6BE5BC68F16

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 280 92fe3e-92fe5a 281 92fe74-92fe81 280->281 282 92fe5c-92fe6f 280->282 284 92fd67-92fdd5 call 92fdd6 281->284 285 92fe87-92fe97 281->285 283 92ff00-92ff07 282->283 288 92ff09-92ff47 283->288 289 92ff4c-92ff98 call 92ff88 283->289 292 92ffe6-930013 call 93000e 284->292 285->284 287 92fe9d-92fedc 285->287 299 92feea 287->299 300 92fede-92fee8 287->300 288->292 302 92ffaa-92ffbd call 92ffbc 289->302 303 92ff9a-92ffa4 289->303 307 930017-930644 call 9300d8 CreateFileW 292->307 308 930015 292->308 306 92fef4-92fefa 299->306 300->306 302->292 303->302 304 92fcd9-92fd63 call 92fcf5 call 92fd40 303->304 304->284 306->283 325 930646-930666 call 930659 307->325 308->307
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 5BE@$R
                                    • API String ID: 0-2534193496
                                    • Opcode ID: 9be05883effbd765ad09778a22db58125baecafd0f900ba8d5cb8ca3408383c9
                                    • Instruction ID: c6c32ef06a915355ac31698b3d9d4c62a70d879895945fb7ebc51a51c319b831
                                    • Opcode Fuzzy Hash: 9be05883effbd765ad09778a22db58125baecafd0f900ba8d5cb8ca3408383c9
                                    • Instruction Fuzzy Hash: F9A137B2D04264AFE7248B20ECA0BFB7778FB81314F1441FAE94956285E6394FC5CB51

                                    Control-flow Graph

                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: PN;9$jjjj
                                    • API String ID: 963392458-917699060
                                    • Opcode ID: 860393547b343024866ab0c8858a119930165002cf97ba93c2d6d78672ffaeea
                                    • Instruction ID: 0b5475607b526f931ff2b02b4059af036960cd5e587f3e4609d9766a8d489e9f
                                    • Opcode Fuzzy Hash: 860393547b343024866ab0c8858a119930165002cf97ba93c2d6d78672ffaeea
                                    • Instruction Fuzzy Hash: 148125B2C0461C9EF7248B24DC85BFB7775FB80314F1441BAEA09A6684EA7C5FC58A52

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 364 92fbe5-92fbfc 365 92fbfe-92fc0d call 92fc0e 364->365 366 92fc3f-92fc8a 364->366 365->366 370 92fc8c-92fcc8 366->370 371 92fccd-92fdd5 call 92fcf5 call 92fd40 call 92fdd6 366->371 372 92ffe6-930013 call 93000e 370->372 371->372 378 930017-930644 call 9300d8 CreateFileW 372->378 379 930015 372->379 398 930646-930666 call 930659 378->398 379->378
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 5BE@$R
                                    • API String ID: 0-2534193496
                                    • Opcode ID: 0f1000a637287439bb5450c8a5a2c0ad81dd7fb3743d230fe0d5ce1f95db1d11
                                    • Instruction ID: 98a8ddf0fb3eb6349999515d037e153fe3461a0ef06f71fba192f69bdd997400
                                    • Opcode Fuzzy Hash: 0f1000a637287439bb5450c8a5a2c0ad81dd7fb3743d230fe0d5ce1f95db1d11
                                    • Instruction Fuzzy Hash: AF7124B2D042646FF7248620EC55BEB7778EBC1310F1480BAE84D66281D6795FC6CF52

                                    Control-flow Graph

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 7D52
                                    • API String ID: 0-1372432686
                                    • Opcode ID: a32bbe8712de0054964fbb48e9575b64ab83cad968acde3ee586f41c73f5ab47
                                    • Instruction ID: 28635b83c59c4553ed9047865ddeb6010a42a8af37995a5bd21a88313d097467
                                    • Opcode Fuzzy Hash: a32bbe8712de0054964fbb48e9575b64ab83cad968acde3ee586f41c73f5ab47
                                    • Instruction Fuzzy Hash: 2D3223B1D082588FE724CB28CD84BEABB79EB85304F1441FAD40D96281D6BE5BC5CF16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: H69P
                                    • API String ID: 1029625771-988670626
                                    • Opcode ID: e8bf6bdb9c8d6e1b828e4a5418bc28f2ca10aa74148031e08321036c686d118d
                                    • Instruction ID: 8094dba36aa06f8fead93d5423ff4b9bd7308fcc850a1e2f600cceda2a4872b9
                                    • Opcode Fuzzy Hash: e8bf6bdb9c8d6e1b828e4a5418bc28f2ca10aa74148031e08321036c686d118d
                                    • Instruction Fuzzy Hash: B0F127B2D181588BF724CB38CD45BEABB79EB94304F1481FAD40D96180D6BE5BC58F26
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 681beac023ffa6d458f59b45752725a787753f2ba695c30acbbe005ddaca77eb
                                    • Instruction ID: c2b16026363b469fb939d3c29d4f406655b1e415cba3d08f0a5905b6f81e87d8
                                    • Opcode Fuzzy Hash: 681beac023ffa6d458f59b45752725a787753f2ba695c30acbbe005ddaca77eb
                                    • Instruction Fuzzy Hash: 3AB147F3C14125AFF7248B14EC85BEB77A8EB90310F1481FAD90D56685E63C9FC68A61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 87J=
                                    • API String ID: 0-1728124889
                                    • Opcode ID: b902892d12abfeabe201e418613c91f4c99f889eee56b3a251b18c745c4c45c4
                                    • Instruction ID: 18051e2a7fe5abdc85e49c4781780e6a560778dfd0343a5f280e073013bd8e3a
                                    • Opcode Fuzzy Hash: b902892d12abfeabe201e418613c91f4c99f889eee56b3a251b18c745c4c45c4
                                    • Instruction Fuzzy Hash: 11A1E6F2D44218AFE7248A24ECC5BFB7779EB80310F1481BBD94D96240E67D5EC28B56
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 580e8fe5324a4991a85e2981a1c1a1bde611170f82d6f1a973f8f881a2b20035
                                    • Instruction ID: 33fc2beffd2c66004ccf4000c4de940e6aefaf98daeb2d8c0c23c25d89ca55ec
                                    • Opcode Fuzzy Hash: 580e8fe5324a4991a85e2981a1c1a1bde611170f82d6f1a973f8f881a2b20035
                                    • Instruction Fuzzy Hash: B4A107B2D0412C9BE7208A24DC55BFBB779FF84314F1481F9D90DA6280E6796FC18E91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: d68bce638fa5220f60e8042a8d58cdbb6b21695accfe383635932b9ceb3defb1
                                    • Instruction ID: a7cbae0df243b5a44ec3904ca7fad097feb6c3b488a99edce57271cd4bf704d7
                                    • Opcode Fuzzy Hash: d68bce638fa5220f60e8042a8d58cdbb6b21695accfe383635932b9ceb3defb1
                                    • Instruction Fuzzy Hash: BA8118F2D0471C5BF3248A24EC95BF77769EB80310F1441BAEA0DA6680DA7D5FC58A62
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 5e8ca8d49d14d35c8c3c2b2fb1d77dd357b82468a697eeaf8f8f3b7c29590e55
                                    • Instruction ID: 8956935140caeddad3993c196a7815f1d428acf8aaeb2213f37c49664caebbfd
                                    • Opcode Fuzzy Hash: 5e8ca8d49d14d35c8c3c2b2fb1d77dd357b82468a697eeaf8f8f3b7c29590e55
                                    • Instruction Fuzzy Hash: 9DB1B0B1D092289BEB34CB18DC45BEAB7B5EB98314F1441FAD90DA2240D6785FC5CF11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 5f3959ec7534d944bc05177316b061b055cc0c70627cadb9dbb1866f3a09ebe5
                                    • Instruction ID: da15272b830241d3d643fc75d18893d9ee2dd0f1d6db559dee3bb8bb2b85106f
                                    • Opcode Fuzzy Hash: 5f3959ec7534d944bc05177316b061b055cc0c70627cadb9dbb1866f3a09ebe5
                                    • Instruction Fuzzy Hash: 3D8148F2D0471C5BF3244A24EC95BF77769FB80310F1481BAEA0DA6680DA7D5FC18A62
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: JCE@
                                    • API String ID: 544645111-1558425100
                                    • Opcode ID: 9cedc28ff546090686a5b71c163a9002017febe2a9c1c14bb06c3cf469e78445
                                    • Instruction ID: 7c07c533459c0fab80da28bad5399094b37ef33f10413664306e2c247ee26706
                                    • Opcode Fuzzy Hash: 9cedc28ff546090686a5b71c163a9002017febe2a9c1c14bb06c3cf469e78445
                                    • Instruction Fuzzy Hash: 7EA1CEB1D046698BEB248F28DD40BEAB7B5EF85314F1481FAD84D62640E7385FC28F46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: 7[W
                                    • API String ID: 4275171209-3315053996
                                    • Opcode ID: 0b238b7472536576de0eaa89319c2746d7fec5600f0d5e45c186bc70ca89f7b1
                                    • Instruction ID: 04c14205f5427766981186f808a11960df9d557738b8cd07c2e1b9361b0df39a
                                    • Opcode Fuzzy Hash: 0b238b7472536576de0eaa89319c2746d7fec5600f0d5e45c186bc70ca89f7b1
                                    • Instruction Fuzzy Hash: 4B12F3B2D045589BF7248A24DC45BEBB779EF94310F0481FAD80EA6380E6795FC68F52
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: Q
                                    • API String ID: 4275171209-854704334
                                    • Opcode ID: 28023f95217fbddc69f3cd1a1ef6953d817c046618b775a154bcd722bf72e17a
                                    • Instruction ID: eccf1adf37814ab04633d8280308a29c1065cb9bcb3d34ce1768feb8cf934517
                                    • Opcode Fuzzy Hash: 28023f95217fbddc69f3cd1a1ef6953d817c046618b775a154bcd722bf72e17a
                                    • Instruction Fuzzy Hash: E4D121B1D049689FEB248A24DC84BFB77B9FF81315F1881FADA4996241D6395FC1CE02
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID: 9PF8
                                    • API String ID: 2962429428-1325012634
                                    • Opcode ID: b71e861dcaa05508153e3fb1a8efbd14076cae238c1631f31d6d18ea8864ae08
                                    • Instruction ID: 6d07fe7d3f992f7d41b6fa3ead382af49175ce73b9a1877237d9a7cf5b4f75fb
                                    • Opcode Fuzzy Hash: b71e861dcaa05508153e3fb1a8efbd14076cae238c1631f31d6d18ea8864ae08
                                    • Instruction Fuzzy Hash: 5FC1E4B1D041689BEB21CB24DC41AEAB7B5EF85300F1480FAE44DA7645E6395FC6CF12
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID: N>=^
                                    • API String ID: 2962429428-2453736645
                                    • Opcode ID: f2ba91f93cee4a64ab5c2b041160315baf4e02651a5acd1eee42214706048948
                                    • Instruction ID: 868ef61eb9a2f4a6087071364ac750ed1331a3eb5653ad1eb0d3e3f2b1f96993
                                    • Opcode Fuzzy Hash: f2ba91f93cee4a64ab5c2b041160315baf4e02651a5acd1eee42214706048948
                                    • Instruction Fuzzy Hash: 77B1C1B1D082689BEB218B24DC817EAB7B5EF85300F1480FAD44DA7655E6395FC6CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 844736d566c9949d759c28b661a38c96250939338e72ba80e6897733ca4178b0
                                    • Instruction ID: a173627131be94053c38d50b0cf7b5fa1860886e6855db00a7ec937b861afdaf
                                    • Opcode Fuzzy Hash: 844736d566c9949d759c28b661a38c96250939338e72ba80e6897733ca4178b0
                                    • Instruction Fuzzy Hash: C12226B2D141589BF724CA28DD45BEBBB79EB84304F1481FAD40D96280D6BE5FC18F26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a0ed88fdf0d14caa6f1c92632f8a1346dc6d36a9a4a31beb25bc8656c488c85
                                    • Instruction ID: 7c85355221240f41de74326fdff2f1a7ae86c1bf6ca75994b514ec8b829345d4
                                    • Opcode Fuzzy Hash: 7a0ed88fdf0d14caa6f1c92632f8a1346dc6d36a9a4a31beb25bc8656c488c85
                                    • Instruction Fuzzy Hash: 951227B2D182549BF724CB28DD45BEABB79EB84304F1481FAD40D96280D6BE5FC18F16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 28eb5d946aafb5ab38582e9f7e75354ad0bd14b2301f49fba208290e2956533a
                                    • Instruction ID: 22d2c32c0d91f1c78b09544b5dd75fd39f145da0adcf4e7265f22805e416450a
                                    • Opcode Fuzzy Hash: 28eb5d946aafb5ab38582e9f7e75354ad0bd14b2301f49fba208290e2956533a
                                    • Instruction Fuzzy Hash: D91238B2D141549BF724CB28DD45BEABB79EB94304F1481FAD40D96280D6BE4FC18F26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed8fcccd79bc3d01024919b50b6a039b76a3f0d0a1b0e5d0d8fac65eb87405f3
                                    • Instruction ID: 703754ce3aec0ff484b74968f458de6edff6eff5463581fce0c83a04c720e3b0
                                    • Opcode Fuzzy Hash: ed8fcccd79bc3d01024919b50b6a039b76a3f0d0a1b0e5d0d8fac65eb87405f3
                                    • Instruction Fuzzy Hash: BBF153B2D142249EF7248A24EC55BFB7B79EF80310F1441BED90E962C1E67D5EC18B62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 48c79f17db4bbdab8238a62883930746de4f6a842710fc9d9e2672a12c15f4e1
                                    • Instruction ID: 81728ae1035b69c65c435d74047e3fd55e77e1595250ec8848dd5e198627b974
                                    • Opcode Fuzzy Hash: 48c79f17db4bbdab8238a62883930746de4f6a842710fc9d9e2672a12c15f4e1
                                    • Instruction Fuzzy Hash: 8F0227B2D142588BF724CB28DD45BEABB79EB94304F1481FAD40D96280D6BE4BC1CF16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 8f9c9fd2e8352cb39c2ceeaff6cce883233f4c52b81fc1f69e6b140e1ced607c
                                    • Instruction ID: 6986e7f274646809a6809a72d5b31373262e71a518affd45ecc4021f0a99713c
                                    • Opcode Fuzzy Hash: 8f9c9fd2e8352cb39c2ceeaff6cce883233f4c52b81fc1f69e6b140e1ced607c
                                    • Instruction Fuzzy Hash: A4F117B1C182988EF724CB38DD44BEABB79EB84304F1481FAD40D96180D6BE5BC58F16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: cccc17b14d395cdb45b9ec73bfca49c8ead673568b802d1373a9b2a403c308c7
                                    • Instruction ID: 83b282850b8819d6e079432a72c5561f8af0fd921ee256f7d2bf466a2132812e
                                    • Opcode Fuzzy Hash: cccc17b14d395cdb45b9ec73bfca49c8ead673568b802d1373a9b2a403c308c7
                                    • Instruction Fuzzy Hash: 1BF117B1D182988FF724CA38CD45BEABB79EB94304F0441FAD40D96181D6BE5BC58F16
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0090FCA9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: a0cfa95f62b713d4b5b2ad63126d967e1d1d9a99ea3694eca4423351550cbb3a
                                    • Instruction ID: a657144d9c5ff40d2a113891cb125f8512789244c7de768db17e9e8bd9458071
                                    • Opcode Fuzzy Hash: a0cfa95f62b713d4b5b2ad63126d967e1d1d9a99ea3694eca4423351550cbb3a
                                    • Instruction Fuzzy Hash: 74F192B2D142299FF7248B14DC49AEAB7B9FB84310F1485FAD90DA2280E7785FC5CE51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: fa8dcc40399ba58940eec5269bb6987e987b93cb2d2b6eb660671d8dc5731f5d
                                    • Instruction ID: c25d04bd29c8a3d81523e2d42302542de30dbcc5fb8d11a4564b7a0acb7e96ed
                                    • Opcode Fuzzy Hash: fa8dcc40399ba58940eec5269bb6987e987b93cb2d2b6eb660671d8dc5731f5d
                                    • Instruction Fuzzy Hash: 88F117B2D181988EF724CB39CD45BEABB79EB94304F0441FAD40D96180D6BE5BC58F26
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: e19865baed9857a9871f5a2c4026b740feb3f1306b8b91b4c41d32991e465569
                                    • Instruction ID: 87b71de2888bc784b0aff099216720c17f58e05d3d98153aad8e7a02ce3af28f
                                    • Opcode Fuzzy Hash: e19865baed9857a9871f5a2c4026b740feb3f1306b8b91b4c41d32991e465569
                                    • Instruction Fuzzy Hash: 58F117B2C182988FF724CA38CD45BEABB79EB94304F0441FAD40D96184D6BE5BC58F16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: ed44a851c4c88b6acc7d0c5ffcb4c16f133bad70cf4c6b353ba0cf9af325c3d8
                                    • Instruction ID: 08d61c9abd71276e7bcfed4828cb8acbf5f67dcd0b3ce84d905c49c9e02a34c6
                                    • Opcode Fuzzy Hash: ed44a851c4c88b6acc7d0c5ffcb4c16f133bad70cf4c6b353ba0cf9af325c3d8
                                    • Instruction Fuzzy Hash: FBF116B1C182988FF724CA38CD45BEABB79EB94304F1481FAD40D96184D6BE5BC58F16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 24fed693930847171cb546ed7d790dcbe27ddc843ae221ade6dac0c7e475ee30
                                    • Instruction ID: 9eadc7cde2efaaed1b984a5d12404e531f3767a4414aa6475e8c9ff78dbeae85
                                    • Opcode Fuzzy Hash: 24fed693930847171cb546ed7d790dcbe27ddc843ae221ade6dac0c7e475ee30
                                    • Instruction Fuzzy Hash: 79F116B1C182988BF724CA28CD45BEABB79EB94304F1481FAD40D96184D6BE5BC58F16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e3ca2cc11fed54ff4a54fac0d5f06d717f27019c868a4a1cea5b541b111a9eb6
                                    • Instruction ID: 011d0f6c7f4ebfb369d6ae016e755401389ecc4c48676ddc07eebedd012066bd
                                    • Opcode Fuzzy Hash: e3ca2cc11fed54ff4a54fac0d5f06d717f27019c868a4a1cea5b541b111a9eb6
                                    • Instruction Fuzzy Hash: E0D103B2D081689FF724CB24DC95AEABB79EB81310F2441FAD94D56281D73C6EC2CE51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 048d8cef36c1a6b0f3dcf6a217b5784af81f396fbd57b81e44ebb6231e41d6c2
                                    • Instruction ID: 487ad4f8eaa975c9e9bd421b396ecd77e8196b0bf39c28c054a81902cb6f6a03
                                    • Opcode Fuzzy Hash: 048d8cef36c1a6b0f3dcf6a217b5784af81f396fbd57b81e44ebb6231e41d6c2
                                    • Instruction Fuzzy Hash: 40C157B2D046149EF7108A24EC95BFB7778EF90310F1481BAD90E966C1E67E5EC1CB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e792d18e2530fa9b3b3c003973df3210de8169a801fd0bdaed6d9d00000a9d4
                                    • Instruction ID: e16c8e982c4264f3371179c2231b54a10db468c26e38be4971b37cccc0c02de4
                                    • Opcode Fuzzy Hash: 0e792d18e2530fa9b3b3c003973df3210de8169a801fd0bdaed6d9d00000a9d4
                                    • Instruction Fuzzy Hash: ACC132B2D142249EF7208B24DC54BFB7679EF91310F1481BAE90D962C1E67D5EC1CB62
                                    APIs
                                    • LoadLibraryA.KERNELBASE(00000041,00412E62,0041307C,00412E62,?,?,?,?,?,?,00000019,00000019,?,?,004129FE,004129FE), ref: 00413418
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: f73b989c36e49737ba16bcb8db3207c3d024309a4faf8c23682ed0e059c3e122
                                    • Instruction ID: 68fcf2f6689c69d927717ee79365b4a85c972a433720d20fd96375829fbe019e
                                    • Opcode Fuzzy Hash: f73b989c36e49737ba16bcb8db3207c3d024309a4faf8c23682ed0e059c3e122
                                    • Instruction Fuzzy Hash: 81D107B1C181988AF724CB28CD45BEABB79EB94304F1481FAC40D96184D6BF5BC58F16
                                    APIs
                                    • LoadLibraryA.KERNELBASE(00000041,00412E62,0041307C,00412E62,?,?,?,?,?,?,00000019,00000019,?,?,004129FE,004129FE), ref: 00413418
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: e18c0113196cbf197c9c0a09fd3ea4d64e1c55021d881bc928c383aefc03d63d
                                    • Instruction ID: 9c546136633581368c643fc48e5b2d4f0d65dfec77795a479303ee077f8a157c
                                    • Opcode Fuzzy Hash: e18c0113196cbf197c9c0a09fd3ea4d64e1c55021d881bc928c383aefc03d63d
                                    • Instruction Fuzzy Hash: 04D106B1C186988EF724CB28CD45BEABB79EB44304F0481FAC40D96184D6BB5BC5CF16
                                    APIs
                                    • LoadLibraryA.KERNELBASE(00000041,00412E62,0041307C,00412E62,?,?,?,?,?,?,00000019,00000019,?,?,004129FE,004129FE), ref: 00413418
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 197fba5ed2fa1d1acc950096ed80ae44aec4a453ac70a99a872013438e5d4b5f
                                    • Instruction ID: 685db6e6754c034d7e57d24a7f2ee9e1369a5a20694af23d03f85a1bccd5a8ed
                                    • Opcode Fuzzy Hash: 197fba5ed2fa1d1acc950096ed80ae44aec4a453ac70a99a872013438e5d4b5f
                                    • Instruction Fuzzy Hash: 5AD106B1D182988AF724CB28CD45BEABB79EB94304F0481FAC40D96184C6BB5BC5CF16
                                    APIs
                                    • LoadLibraryA.KERNELBASE(00000041,00412E62,0041307C,00412E62,?,?,?,?,?,?,00000019,00000019,?,?,004129FE,004129FE), ref: 00413418
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 9685453c858acef7bbe08a609eba0d138d8fff13938d5bed7f656a7703b5964d
                                    • Instruction ID: ba361cb80cab4e2aa1748923d4768de877caf7156e757222a378a47da172c41c
                                    • Opcode Fuzzy Hash: 9685453c858acef7bbe08a609eba0d138d8fff13938d5bed7f656a7703b5964d
                                    • Instruction Fuzzy Hash: 81D107B1C185998AF724CB28CD45BEABB79EB54304F1481FAC40D9A184C6BF5BC58F16
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 3be3174dd3cd9d79a627e91fdefaaa32ff7f2729f6bf8127ef592b982d6a05ed
                                    • Instruction ID: 96c8c416ef09b65182ac49eb9859cb1ec8255d27186aa3d180cefa8ec86ead54
                                    • Opcode Fuzzy Hash: 3be3174dd3cd9d79a627e91fdefaaa32ff7f2729f6bf8127ef592b982d6a05ed
                                    • Instruction Fuzzy Hash: 97D18071E046688BDB24CB28CD50BDABBB5EF89314F1481EAD84DA7640DB785BC5CF06
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: fbe901cf6143a8eb8d98041d06f2c6ba56e78e64c0a2503e73adda28b62a49d2
                                    • Instruction ID: 3894d242a1016a62031ae219b8cc3fa908a0c3528fd616ca7727f4cb5470888e
                                    • Opcode Fuzzy Hash: fbe901cf6143a8eb8d98041d06f2c6ba56e78e64c0a2503e73adda28b62a49d2
                                    • Instruction Fuzzy Hash: 9F12F2B2D045549BF7248B24DC45BEBB779EF94310F1481FAE80EA6380E6395EC68F52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: cf6b0ef9e43c76231d47be816256593b5ca41b43bbe4d4e47af66ca22d1d84bf
                                    • Instruction ID: f70bb2b9d2e59142af73a13e7f234ffaba5a3ceacf7a6218068c3442be7c293b
                                    • Opcode Fuzzy Hash: cf6b0ef9e43c76231d47be816256593b5ca41b43bbe4d4e47af66ca22d1d84bf
                                    • Instruction Fuzzy Hash: 9B2216B2D051649BE7248B24DC85BEAB7B5EF85310F1480FAE80DA7245D6385FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b52ad58f9f3e527aea48f0031ae447d1224f7446b4abdbe1b419ba34039b9eec
                                    • Instruction ID: ddfe8b74e73b63d3e83e9b278a76ad43540f32ed2bfe7d6527ee3f62716df26f
                                    • Opcode Fuzzy Hash: b52ad58f9f3e527aea48f0031ae447d1224f7446b4abdbe1b419ba34039b9eec
                                    • Instruction Fuzzy Hash: D8B145B2E142149FE7288A14DC94AEA77B9EB80310F1541FEE90D972C1D73D6EC18E92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 7b21e0b2bef6690b3aa9fc7a5c8d50a79e4d561df52c152aad01dbc30c9e9c50
                                    • Instruction ID: 46349d54f7ac578d2fdf1a5e65fd08a1a7692d39cf5cbb7adb50a648949d5291
                                    • Opcode Fuzzy Hash: 7b21e0b2bef6690b3aa9fc7a5c8d50a79e4d561df52c152aad01dbc30c9e9c50
                                    • Instruction Fuzzy Hash: BF12F3B2D045589BF7248A14DC45BEBB779EF94310F1481FAD80EA6380E6395FC68F52
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 0140f9e48abfe85ad68b6e47ee759a07724a956fd4cc8692ad96253a84439f59
                                    • Instruction ID: 15dcfd778898b3ce6832c1a44629109f08f74687ff8f40f831ff671d724ece92
                                    • Opcode Fuzzy Hash: 0140f9e48abfe85ad68b6e47ee759a07724a956fd4cc8692ad96253a84439f59
                                    • Instruction Fuzzy Hash: 4571E7F2D141249EF7208A25DC85BFB7779EF85310F1481BBE94D96640E23C5EC28AA7
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 31822dbf289aef4df6e32976faaccfb6202d25443d5fa6dee9a27f7e663600a7
                                    • Instruction ID: 2f2849ed1bd1c2d124ca93f2bc11c04e945c198c9a742bfe037e915e578295f0
                                    • Opcode Fuzzy Hash: 31822dbf289aef4df6e32976faaccfb6202d25443d5fa6dee9a27f7e663600a7
                                    • Instruction Fuzzy Hash: FE7127F2D04224AFF7248A21EC55BFB7B78FB81310F1581BAE94D56280D6785FC18B92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 80bacb90ebba5bfe33d3852e4ca0bf8bb1a024255b67ed88ea578d910e0cbdeb
                                    • Instruction ID: 8e4d7bc80c36a560d819fc95325cc069f1b93cf40564af95884243f3a55380bb
                                    • Opcode Fuzzy Hash: 80bacb90ebba5bfe33d3852e4ca0bf8bb1a024255b67ed88ea578d910e0cbdeb
                                    • Instruction Fuzzy Hash: B37127F2D086189FF7348B54DC95AE77B68EB81310F1442FED94E42680D73C5EC68A52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31dbf633aa006d1c5928237ce6c2e3f9b1082b282022c84a0b0f03e239399d03
                                    • Instruction ID: c6c6a236b98ead54bc5c1405ed2cfbeb93079af9db1b2ed2cbde8b8eb090ef9d
                                    • Opcode Fuzzy Hash: 31dbf633aa006d1c5928237ce6c2e3f9b1082b282022c84a0b0f03e239399d03
                                    • Instruction Fuzzy Hash: 7471FAF2D44218AFF7248A14EC85BFB7779EB80710F1080BAE94D96240E67D5EC18B55
                                    APIs
                                    • VirtualProtectEx.KERNELBASE(?,?,00001000,00000040,?), ref: 0090B3C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 34685260680448ff6737195677eb30f2e55af384ab0127260b8533547a0f3730
                                    • Instruction ID: 3415d443cdca6769374a1cde48ec8cab0c0a378c2d60a67e4d5c32b4cad41b1c
                                    • Opcode Fuzzy Hash: 34685260680448ff6737195677eb30f2e55af384ab0127260b8533547a0f3730
                                    • Instruction Fuzzy Hash: AF7107B2D012249FF7208A14EC85BEB7779EF91310F1481BAE90D56681E6795EC1CB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 467ee1954c5fc635aa634afa7d59deab3c858c04b06ce9e3d70abb1cb1e853b0
                                    • Instruction ID: d44a777db51f8b28e443b60a329e8a82ca2a40ff77446df5fb9420008b07b920
                                    • Opcode Fuzzy Hash: 467ee1954c5fc635aa634afa7d59deab3c858c04b06ce9e3d70abb1cb1e853b0
                                    • Instruction Fuzzy Hash: ED02D5B1D151689BE7208B24EC81BEAB7B9EF85310F1480FAD44DA7241E6395FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: abea441612a0f467895e79582060ed38df3af34d84f1c1ea1cbed8c310e11844
                                    • Instruction ID: 957819c9f192194d9daf0ff4e04562e90351947be2dcaa4b7241ca887b0d445c
                                    • Opcode Fuzzy Hash: abea441612a0f467895e79582060ed38df3af34d84f1c1ea1cbed8c310e11844
                                    • Instruction Fuzzy Hash: 0A6107F2D40118AFF7248A15EC85BFB7739EBC0710F1081BAE90D96240EA7D5EC18B66
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,?,?,?,?,?,?,?,?,?,009086BE,?,009086BE), ref: 0092C4DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: 36e682b40685ef7ee5bbb4c8eaa04a6af8d5f652a3700dd43070738bb5e2fa9a
                                    • Instruction ID: dfda702ecb2c56e89fc0dc86a0bf2d349e91539c442e031d2ec53aef4bf72069
                                    • Opcode Fuzzy Hash: 36e682b40685ef7ee5bbb4c8eaa04a6af8d5f652a3700dd43070738bb5e2fa9a
                                    • Instruction Fuzzy Hash: 199190B1D082689FEB25CB18DC956EABBB5EF84314F0441EAE84DA2640D7785FC5CF42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 071682226b20471e8c0d88ed6af4984a44dca9a95185c1a9fa286133cbe3ec77
                                    • Instruction ID: 3fbd89fb497dae80f2f269fbcd92e7ba9134ec655fa50bbebda578826c45ff3e
                                    • Opcode Fuzzy Hash: 071682226b20471e8c0d88ed6af4984a44dca9a95185c1a9fa286133cbe3ec77
                                    • Instruction Fuzzy Hash: E7F1E3B1D045589FF7248A24DC45BEBBB79EF94310F0481FAD80EA6280E6795FC68F52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: ad54c969940ec9d8ea0a7649e49e5e2c6d8be863fbd3def2c289cbdaa601283c
                                    • Instruction ID: d457e1c874ed81e5899ea83f8b2686448c7fadd950f6503a4fdf9167d26d8743
                                    • Opcode Fuzzy Hash: ad54c969940ec9d8ea0a7649e49e5e2c6d8be863fbd3def2c289cbdaa601283c
                                    • Instruction Fuzzy Hash: 0AF1F2B1D052689BE7208B24DC41BEAB7B5EF85310F1480FAE44DA7645E6385FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: cb4a11e0cf6f2b412f1f0f38cba33cf02f8c6e71f239aeeb87e8f00ccc1120b8
                                    • Instruction ID: b15ce64301bfc12fc0b6f6abfa2df10040bc3f8d33d4e0fdba8ab5fd250fa877
                                    • Opcode Fuzzy Hash: cb4a11e0cf6f2b412f1f0f38cba33cf02f8c6e71f239aeeb87e8f00ccc1120b8
                                    • Instruction Fuzzy Hash: 1EF1F3B1D045589BF7248A14DC45BEBBB79EF94310F1480FAD80EA6280E6795FC68F52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 16f6fb687bc914980df2e4226cd21a4a0ae253a70127c48ac0865eb57b8ad609
                                    • Instruction ID: f1c758d9c651a1d1212a3198f62760c2a94bce486a3fbd051857a2d66d5b5174
                                    • Opcode Fuzzy Hash: 16f6fb687bc914980df2e4226cd21a4a0ae253a70127c48ac0865eb57b8ad609
                                    • Instruction Fuzzy Hash: 31F103B1D045589BF7248A24DC45BEBBB79EF94310F0481FAD80E66380E6396FC68F52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aef8c1668dea65dddc22df6dcf046ea42bb2230d9cefcaf97b6207085495547d
                                    • Instruction ID: 55609a824f60cee9716f1d17ae3aa197f78d86d512fe8d947a7185235d935f02
                                    • Opcode Fuzzy Hash: aef8c1668dea65dddc22df6dcf046ea42bb2230d9cefcaf97b6207085495547d
                                    • Instruction Fuzzy Hash: BD61C272D046288FD724CB29CD80AEABBB5EF88304F1481EAD40DA7294D6785BC5CE56
                                    APIs
                                    • VirtualProtectEx.KERNELBASE(?,?,00001000,00000040,?), ref: 0090B3C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 43670d47c1e9dd491f6372380848afd5ade688905aefd68faa0b148dd1691b21
                                    • Instruction ID: ca6a6c634732d96b04b699fdfb696f1901abe7e90877152937b13a6883b53fd1
                                    • Opcode Fuzzy Hash: 43670d47c1e9dd491f6372380848afd5ade688905aefd68faa0b148dd1691b21
                                    • Instruction Fuzzy Hash: F151F6F2D152249FE7288A24DD51BF77B78EB80310F1441FEDA0E666C1D63D5EC18A92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 1b8f3c473c5db2475b4ee3a1381978e2df7d54440b434cc5529c08ee324efaa6
                                    • Instruction ID: fb15718a681c96ceeec10873a8a43636319639717e12d80dd61660e028c606d7
                                    • Opcode Fuzzy Hash: 1b8f3c473c5db2475b4ee3a1381978e2df7d54440b434cc5529c08ee324efaa6
                                    • Instruction Fuzzy Hash: 89F1F5B1C046689BF7248B25DC45BEBB7B5EF94310F0481FAD80EA6280E6795FC68F51
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 018e33128fe7920b94d2d3a51bc8969b7ba01c739b6e1842258d680c394b0094
                                    • Instruction ID: 4c3cfa8df6dc23f06045230222ef02c7bdc4d15507de090a8bf965ebefd08f72
                                    • Opcode Fuzzy Hash: 018e33128fe7920b94d2d3a51bc8969b7ba01c739b6e1842258d680c394b0094
                                    • Instruction Fuzzy Hash: 0302ADB1D092688BEB25CB28DC41AEAB7B5EF89300F1480EAD44DA7355D6345FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 62609fd74ac5d35a35f40aaad26328c58fdb3c8cdfdf4112696467d40b72c20b
                                    • Instruction ID: bb27efb9cf2e0cb3318d79c918f756db726f548ac0324918cc382e3343a67998
                                    • Opcode Fuzzy Hash: 62609fd74ac5d35a35f40aaad26328c58fdb3c8cdfdf4112696467d40b72c20b
                                    • Instruction Fuzzy Hash: 77F1F1B1D051689BEB208B24DC81BEAB7B9EF85310F1480FAD44DA7245E6385FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a342dcd9ca99331cde2bf6bdc0b9118a3b603ad6781b044250909ef620a742f4
                                    • Instruction ID: 313ef4fdff27e10d88099cefd85410ef89c427ae1b7b4d241053f5f73a09cdd3
                                    • Opcode Fuzzy Hash: a342dcd9ca99331cde2bf6bdc0b9118a3b603ad6781b044250909ef620a742f4
                                    • Instruction Fuzzy Hash: 8BF1E4B1D052689BEB208B24EC817EAB7B5EF85310F1480FAD44DA7245E6395FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: cdd4a6e1b8533941806f2e04b5779ef442f4716b0ecb1f71877b40e050b1a6c5
                                    • Instruction ID: 8bfab02ca2eb0ac71d4b3d4894d3acb61589bbec4e22a5b2702829672229af21
                                    • Opcode Fuzzy Hash: cdd4a6e1b8533941806f2e04b5779ef442f4716b0ecb1f71877b40e050b1a6c5
                                    • Instruction Fuzzy Hash: 72F102B1D052689BEB208B24DC41BEAB7B9EF85300F0481FAD44DA7641E6395FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 632a58d4b9440c19b0648dac9262503628e974a7fdff4f71b36e79fe224860d9
                                    • Instruction ID: dfc032172b0fb8e25e7fbd31cea0e88670c2e9ba738fc3d5eb9b738cdebca888
                                    • Opcode Fuzzy Hash: 632a58d4b9440c19b0648dac9262503628e974a7fdff4f71b36e79fe224860d9
                                    • Instruction Fuzzy Hash: E3E103B1C046589BF7248B25DC45BEBBB79EF94310F0481FAD80EA6280E6795FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: e4f7083b0cf60427be9de7d4e641d34711a53cb34708e79f42ae3befa3e6214a
                                    • Instruction ID: 09f98581383dc1c6dbb9cba1c3d4040147b0f15f29d3edba9d8b3caf925d2c97
                                    • Opcode Fuzzy Hash: e4f7083b0cf60427be9de7d4e641d34711a53cb34708e79f42ae3befa3e6214a
                                    • Instruction Fuzzy Hash: 4FE1F4B1D046689BF7248A25DC45BEBBB75EF84310F0580FAD80EA7280E6795FC58F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 00c5003582102c3bd5141b44f6a213753ee386f8f9e602b80c811ecdf18253b4
                                    • Instruction ID: c6e9c8bde0b33d4c7472fd848bd7783c4c275eddfe6d9608dcca4e14715de950
                                    • Opcode Fuzzy Hash: 00c5003582102c3bd5141b44f6a213753ee386f8f9e602b80c811ecdf18253b4
                                    • Instruction Fuzzy Hash: 9AE1F2B1D046589BF7248B24DC45BEABBB9EF94310F0481FAD80EA6280E6795FC58F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: c2d6c649e2e1baa43f699cb28eb06fda6a7e526f639a740b19787b5d361588bf
                                    • Instruction ID: c4e81914a28b8b74df96a7c95b0aaace8179d460002509a6c75655416fc6b70b
                                    • Opcode Fuzzy Hash: c2d6c649e2e1baa43f699cb28eb06fda6a7e526f639a740b19787b5d361588bf
                                    • Instruction Fuzzy Hash: 7EF1D2B1D152689BEB208B24DC81BEAB7B5EF85310F1480FAD44DA7241E6395FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: f8daa251e5a91ae86092a3ceea3e50c7f022f86ad420f0dace9615d31f70abb5
                                    • Instruction ID: ef9090cfdf093ec2173e260b51239af36d6b5be2d45652e365e193ecfe14a399
                                    • Opcode Fuzzy Hash: f8daa251e5a91ae86092a3ceea3e50c7f022f86ad420f0dace9615d31f70abb5
                                    • Instruction Fuzzy Hash: 80E1F6B1D051689BEB218B24DC81BEAB7B5EF85310F1480FAE44DA7245D6389FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 3f2d03fa5596b8ccd7b38283cab3cdf986f90f72586131ed3da5e7afabc67a61
                                    • Instruction ID: 4af10f5e1a2c0ee82c973ed3f34b38fa504ca01b3035404b5c90dcb7fe8652ca
                                    • Opcode Fuzzy Hash: 3f2d03fa5596b8ccd7b38283cab3cdf986f90f72586131ed3da5e7afabc67a61
                                    • Instruction Fuzzy Hash: 09E1E4B1D045589BE7248B24DC45BEBBB79EF94310F0481FAD80EA7280E6795FC68F52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 5f5917e9f8cf0eb32351dd55a2fbac56960e89d2a089e523a6d88763b2f2355e
                                    • Instruction ID: 8b9498b894bc57f4cb5a0805876438e969980307656ea6296fb968eb2592402e
                                    • Opcode Fuzzy Hash: 5f5917e9f8cf0eb32351dd55a2fbac56960e89d2a089e523a6d88763b2f2355e
                                    • Instruction Fuzzy Hash: 3AE103B1D046589BF7248B24DC45BEBBB79EF94310F0481FAD80EA6280E6795FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 0cff8df51398586e2d3b212884640f1c0b977d19f6b7d56f4dfe69613170a4ba
                                    • Instruction ID: 9d2d7b501ab6db62f5474df3817d4109d317ff701c08fad3af006ee7de772751
                                    • Opcode Fuzzy Hash: 0cff8df51398586e2d3b212884640f1c0b977d19f6b7d56f4dfe69613170a4ba
                                    • Instruction Fuzzy Hash: 72E1F6B1D052689BEB21CB24DC41BEABBB5EF85310F1480FAD44DA7245D6389EC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 42481a7647596beb3b0faba8fa8eebc07ebb51e947738921e8d309b03c0a9e89
                                    • Instruction ID: eb758a9a99184ca3546e0ad97c762271f6339bbbe06e729a2c229462551f2538
                                    • Opcode Fuzzy Hash: 42481a7647596beb3b0faba8fa8eebc07ebb51e947738921e8d309b03c0a9e89
                                    • Instruction Fuzzy Hash: DAE1F3B1D046589BF7248B24DC45BEBBB79EF94310F0481FAD80EA6280E6795FC58F52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: b5f9d08b2c31b73fd452273a6ab4e71c5e86bd892ed1c4fa35dd4a20199bb1b0
                                    • Instruction ID: ca7f3377493256373791137e41fdae3399cd8638ca116d3dfc8f3c01e674bee0
                                    • Opcode Fuzzy Hash: b5f9d08b2c31b73fd452273a6ab4e71c5e86bd892ed1c4fa35dd4a20199bb1b0
                                    • Instruction Fuzzy Hash: 1AE1E2B1D046589BF7248B15DC45BEBBB79EF94310F0480FAD80EA6280E6795FC68F52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 237e44f665a9287c54dcc2fdf553b3516bc83ba852807aa9203f33f13300e365
                                    • Instruction ID: bbb19248258d816fe9e6cd902793e92422680380b94f2398aa206649b64324c1
                                    • Opcode Fuzzy Hash: 237e44f665a9287c54dcc2fdf553b3516bc83ba852807aa9203f33f13300e365
                                    • Instruction Fuzzy Hash: 1AE19EB1D051688BEB21CB24DC81BEAB7BAEF85304F1480EAD44DA7255D6385FC6CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 8dab075495088b8315e27cdb03deece55d2ac3725a956baeed2078138db4cd1e
                                    • Instruction ID: f16e0965aafc163c66714175089c44f4bc66c948915224f3b2c52c005bc8ce23
                                    • Opcode Fuzzy Hash: 8dab075495088b8315e27cdb03deece55d2ac3725a956baeed2078138db4cd1e
                                    • Instruction Fuzzy Hash: 5DD1E5B1D046589BF7248B14DC45BEBBB79EF94310F0481FAD80EA6380E6795EC68F52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: ca7d1aa2981cc0b410d31164be2f8430bf366a1ae2b28902d67bad02af66df6d
                                    • Instruction ID: edfd8629cc4303a7b11aafc91cb220ec729e20697686e296130920f6ecca9c40
                                    • Opcode Fuzzy Hash: ca7d1aa2981cc0b410d31164be2f8430bf366a1ae2b28902d67bad02af66df6d
                                    • Instruction Fuzzy Hash: E2E1E2B1D046589BF7248B14DC45BEBBBB9EF94310F0480FAD80EA6280E6795FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 71e58f27764a3f980edc568aae15c1ff5ca118dbe02431360154ad41c845e861
                                    • Instruction ID: fd22c3dac99a4446288314a9190eaa9acd3b63fe2b5b3357d6d1ef67796314e1
                                    • Opcode Fuzzy Hash: 71e58f27764a3f980edc568aae15c1ff5ca118dbe02431360154ad41c845e861
                                    • Instruction Fuzzy Hash: 7CE1E2B1D046589BF7248B24DC45BEBBB79EF94310F0480FAD80EA6280E6795FC68F51
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 07eed11d892d216fe0f2b3e1e5958be9523ec0f1793a66c3d9cc5e5e93aa94c4
                                    • Instruction ID: 3e1ac08e5717390c87e76ef791dbc9ec6027af65f02d3f4b233cc4f73d4dd201
                                    • Opcode Fuzzy Hash: 07eed11d892d216fe0f2b3e1e5958be9523ec0f1793a66c3d9cc5e5e93aa94c4
                                    • Instruction Fuzzy Hash: 12E105B1E052689BE7208B28DC41BEAB7B9EF85310F1480FAD44DA7255D6385FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 651467fb5282a52cc7f40f43e9e9d53f021e0dc2d4ccdd7ece0196be77c287cb
                                    • Instruction ID: 7e52ef16451576504827a850911c8b31eb9f7266a5339b22320b4c2fc6e87ebb
                                    • Opcode Fuzzy Hash: 651467fb5282a52cc7f40f43e9e9d53f021e0dc2d4ccdd7ece0196be77c287cb
                                    • Instruction Fuzzy Hash: 09E1D1B1D092688BEB218B28DC417EAB7B5EF89310F1480FAD44DA7255E6345FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 74c3d6d33e301f75d303773e2c299509da0a2fdfaacfbfabb127c7825e5c2aa1
                                    • Instruction ID: a309ed4473b6989a87e48c6f5ed2f9bb4eafabdcaab6d4e1bb7016c50cd70b47
                                    • Opcode Fuzzy Hash: 74c3d6d33e301f75d303773e2c299509da0a2fdfaacfbfabb127c7825e5c2aa1
                                    • Instruction Fuzzy Hash: F6E1C0B1D092688BEB218B28DC417EAB7B5EF89310F1480FAD44DA7255E6345FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: e4f0a44b911d762e28ee48c1331face9881dd428f41a60311b09f8ca665f375e
                                    • Instruction ID: 746da133dc35d2e7b86e521087cbb8c9d752ce8c9ce0781671989ecc7fd6ab3f
                                    • Opcode Fuzzy Hash: e4f0a44b911d762e28ee48c1331face9881dd428f41a60311b09f8ca665f375e
                                    • Instruction Fuzzy Hash: 26E1E4B1D052689BEB21CB24DC81BEAB7B5EF85310F1480FAD44DA7251D6389EC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 3a525df4bb406f93ab7209377e518178948875b0e0397cc8d2db14aded1d74af
                                    • Instruction ID: 121bfa65cce946ed82415dedaaf6366e38906f021a030376865b1c3505f9cc51
                                    • Opcode Fuzzy Hash: 3a525df4bb406f93ab7209377e518178948875b0e0397cc8d2db14aded1d74af
                                    • Instruction Fuzzy Hash: 83D1D2B1D046589BF7248B24DC45BEBBB75EF94310F0481FAD80EA6280E6795FC68F51
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: bebd921562a826303b43a9fad6362f24c997b2019e8907db8fac0e09e8c1d6e1
                                    • Instruction ID: e93da697e2788dd4b7210ef37ca83f5e7fd36e731196143bcbf395252eee7270
                                    • Opcode Fuzzy Hash: bebd921562a826303b43a9fad6362f24c997b2019e8907db8fac0e09e8c1d6e1
                                    • Instruction Fuzzy Hash: 84D1C2B1D046589BE7248A14DC45BEBBB79EF94310F0481FAD80EA6380E6795FC68F51
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 0239896bc62e41120d7cd9cbfe0b443268d1208fe438dae7df26f8b290800989
                                    • Instruction ID: c9846bc27b38fb59494a5cc1f45acbb6ae65e7449c31540e1a1babd03e3d19b7
                                    • Opcode Fuzzy Hash: 0239896bc62e41120d7cd9cbfe0b443268d1208fe438dae7df26f8b290800989
                                    • Instruction Fuzzy Hash: 9FD1D2B1D046589BE7248B14DC45BEBBBB5EF94310F0481FAD80EA6380E6796FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e8e4e53fada7c956d3d9e97cdcf6162446305fc0bea3d24ac5d20df0c9839807
                                    • Instruction ID: a0e848aa93ab8d966ccfbe0cc2d44dbf840fe799ab218cbbea2823c1355852f7
                                    • Opcode Fuzzy Hash: e8e4e53fada7c956d3d9e97cdcf6162446305fc0bea3d24ac5d20df0c9839807
                                    • Instruction Fuzzy Hash: 27D1E2B1D052689BEB21CB24DC81BEAB7B5EF85310F1480FAD44DA7245E6385EC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9a0382e3579c041baf1e75902b87e20b3b2890330330aa6ba2f862bfa4f503b8
                                    • Instruction ID: 8f287f0fa2e6518ef27ad742917f6a4a71b8d806d7f00dab0d6a070f71cab79f
                                    • Opcode Fuzzy Hash: 9a0382e3579c041baf1e75902b87e20b3b2890330330aa6ba2f862bfa4f503b8
                                    • Instruction Fuzzy Hash: 0AD1D1B1D052689BEB208B24DC81BEAB7B5EF85310F1480FAD44DA7245E6385FC6CF52
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 44b17ac716bf454d5d1b14b4393ccfe5a47494c20ea658975a08a7d9088b8195
                                    • Instruction ID: 01c54c74ae3c63ff1d3afb2a2cffc2c817f2619b1404552f77960b43ed8a5121
                                    • Opcode Fuzzy Hash: 44b17ac716bf454d5d1b14b4393ccfe5a47494c20ea658975a08a7d9088b8195
                                    • Instruction Fuzzy Hash: 0DD1C2B1D046589BF7248A24DC45BEBBB79EF94310F0481FAD80EA6380E6795FC68F51
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: bf710138b889c27f14ddb7c87f2f15c26157582b878d2f81cb89e3b4f02d27d8
                                    • Instruction ID: 665f2d0b6c9d6782d15c5f5a3c325dd18c122f8f1c548bc90cad9ff301ac1622
                                    • Opcode Fuzzy Hash: bf710138b889c27f14ddb7c87f2f15c26157582b878d2f81cb89e3b4f02d27d8
                                    • Instruction Fuzzy Hash: FDD1C1B1D046589BE7248B14DC45BEBBB79EF94310F0481FAD80EA6380E6795FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 6375f69c0f6cadbe31285d290fccbfbce7bd964d03536673a7ad17be4f786e8a
                                    • Instruction ID: 4c74633be11b0b8f2081ad908121b9750ff7e9d3327c68bb0c458cc6e98c419e
                                    • Opcode Fuzzy Hash: 6375f69c0f6cadbe31285d290fccbfbce7bd964d03536673a7ad17be4f786e8a
                                    • Instruction Fuzzy Hash: 1BE1D4B1D052A89BEB218B28DC417EAB7B5EF85310F1480FAD44DA7255E6385FC6CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 9805fe815e896d360da598072cc2db8a5823c085afccd6f27ca2eea2153ba6dc
                                    • Instruction ID: 2e912a5cbe1be1245ad50e6e9578f57b672f933afdb98b5aac19ef0be49282e9
                                    • Opcode Fuzzy Hash: 9805fe815e896d360da598072cc2db8a5823c085afccd6f27ca2eea2153ba6dc
                                    • Instruction Fuzzy Hash: 78D1C1B1D042689BEB218B24DC81BEAB7B5EF85310F1480FAD44DA7251E6395FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 0cdf6412d54e4214d8fa388111f78104a6bedac3a2e615b9d77c9faefe24a0a6
                                    • Instruction ID: 93446ab649606e227d8044bcff233ae8a384a3e6ca7af9fed5d746154146b25f
                                    • Opcode Fuzzy Hash: 0cdf6412d54e4214d8fa388111f78104a6bedac3a2e615b9d77c9faefe24a0a6
                                    • Instruction Fuzzy Hash: C0D1C4B1D042689BEB21CB24DC817EAB7B5EF85310F1480FAD44DA7251E6399EC6CF52
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 94d403468b8ad9dad55bdd87402976de041919405bb102ecb9b85d0a5c869a21
                                    • Instruction ID: 28118064654322da9b47b63ec87e3728dfb9ab32f322bfbdc6be35a0fd5c319d
                                    • Opcode Fuzzy Hash: 94d403468b8ad9dad55bdd87402976de041919405bb102ecb9b85d0a5c869a21
                                    • Instruction Fuzzy Hash: 1DC1C1B1D046589BE7248B24DC45BEBBB75EF94310F0481FAD80EA6380E6795FC68F51
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,39335C83,00003000,00000004), ref: 009347C6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 1edae8b4b8e0c4ec0422b3d18eca2b9b5342438d9f727a2010cdc2954dc62dbf
                                    • Instruction ID: c222c30051e656151391e49b9cbc5b468b2471e01a7a6ffce6a0b4501b1d4d9e
                                    • Opcode Fuzzy Hash: 1edae8b4b8e0c4ec0422b3d18eca2b9b5342438d9f727a2010cdc2954dc62dbf
                                    • Instruction Fuzzy Hash: 81C1C0B1D046589BF7248B24DC45BEBBB79EF94310F0481FAD80EA6280E6795FC68F51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: df01d5d106556094c180bb87b6299109c6e411b25f81c4935701fe07c72c2f0c
                                    • Instruction ID: 69ace62c7db26e4d1b8538e141ed95bcaa31a46d0014318a5c5b6c369b4ab650
                                    • Opcode Fuzzy Hash: df01d5d106556094c180bb87b6299109c6e411b25f81c4935701fe07c72c2f0c
                                    • Instruction Fuzzy Hash: 29D1D0B1D051688BEB21CB28DC81AEAB7B9EF85310F1481FAD44DA7251D6385FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: c7a38b4acfb1b885bfdff268aea664d71b493676cb20487b82e645c997c3a0b7
                                    • Instruction ID: 424aedeffe761a2bfe8786e265b40123d5a3bc6f7cb6f67d028e2b6a08c85243
                                    • Opcode Fuzzy Hash: c7a38b4acfb1b885bfdff268aea664d71b493676cb20487b82e645c997c3a0b7
                                    • Instruction Fuzzy Hash: 8FD1D3B1D092A89BEB218B28DC417EAB7B5EF85300F1480FAD44DA7255D6385FC6CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: e27ce3371ade90565ce916bf504824a82134472b849b75bfb1034f88a35db6fb
                                    • Instruction ID: 7e6b8e52cf9840ab28c6831a9eafc49c7b91cbf11c6f703953106299f9ec4b4a
                                    • Opcode Fuzzy Hash: e27ce3371ade90565ce916bf504824a82134472b849b75bfb1034f88a35db6fb
                                    • Instruction Fuzzy Hash: 47D1D1B1D042689BEB21CB24DC81AEAB7B5EF85310F1480FAD44DA7251E6359EC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 29be6b8c867bc56436faea252415b6071dd9d5c8106e24ca3e55df0603a52e3a
                                    • Instruction ID: 374aa566374a2fd1e820a4f3d6b456d2e610ebb003c904439e068971cb5ed7ce
                                    • Opcode Fuzzy Hash: 29be6b8c867bc56436faea252415b6071dd9d5c8106e24ca3e55df0603a52e3a
                                    • Instruction Fuzzy Hash: 2DD1C1B1D042689BEB218B24DC817EAB7B5EF85310F1480FAD44DA7251E6399FC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8946b2539b27f53a1cf125141da3ed118524740d144cee17eafa8fcc04a1bceb
                                    • Instruction ID: 614cbcafc29ac2c7a8628ce856d2249237b24c19bc1a1efe736ac4a741ac366b
                                    • Opcode Fuzzy Hash: 8946b2539b27f53a1cf125141da3ed118524740d144cee17eafa8fcc04a1bceb
                                    • Instruction Fuzzy Hash: D8B127F3D146245FF7148A24DC59BE77768EB80310F1542BEE90E626C0D67D6FC18A92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: df66a821b05f4b7c6b5dfc8838d9df69658f913b5a7ed26184cf2fc81de8c0f4
                                    • Instruction ID: 205b5e6ec288b43adce7e737b9a2111051306cab766cd2a9bb381e366535fab3
                                    • Opcode Fuzzy Hash: df66a821b05f4b7c6b5dfc8838d9df69658f913b5a7ed26184cf2fc81de8c0f4
                                    • Instruction Fuzzy Hash: A4C1CFB1D042689BEB21CB24DC816EAB7B5EF85310F1480FAD44DA7251E6389EC6CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 6524fc4bf208f42cd4637affa885d12da86c412202bd417c8e2a36f3981b3055
                                    • Instruction ID: 120180b020c765fc7cc01273dd0a05b76e5d81efcc41a799a9a535c15b3e3b32
                                    • Opcode Fuzzy Hash: 6524fc4bf208f42cd4637affa885d12da86c412202bd417c8e2a36f3981b3055
                                    • Instruction Fuzzy Hash: FAC1C1B1D042689BEB218B28DC417EAB7B9EF85300F1480FAE44DA7255D6385FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 56c8d68be07dd5788406c347328ba721fd60bacd34e897f8b6606a02a1661f2e
                                    • Instruction ID: 4a6aeda9d620d1cd61f9a36c97a2f2aa0fcdb32a1ca15cbc46810b691cf30dff
                                    • Opcode Fuzzy Hash: 56c8d68be07dd5788406c347328ba721fd60bacd34e897f8b6606a02a1661f2e
                                    • Instruction Fuzzy Hash: 34C1D2B1D042A89BEB21CB28DC416EAB7B5EF85300F1480FAD44DA7255E6385FC6CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: e0fc851b8ece82499fef03ab6016128b5ba0b2e631db8000bec33735c4b92a25
                                    • Instruction ID: a039fd31ee18275ae7cd41d6ff1e40d8435d287c25749b2c5473db21faecb2ed
                                    • Opcode Fuzzy Hash: e0fc851b8ece82499fef03ab6016128b5ba0b2e631db8000bec33735c4b92a25
                                    • Instruction Fuzzy Hash: 89C1DFB1D042688BEB218B24DC81BEAB7B5EF85310F1480FAD44DA7245E6395FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 48530621e337c3bc95c9742e65efd2931dca66ee0a45ef8abf044a7ccf887c04
                                    • Instruction ID: 0d27c4aaab23515210eaed4e4a29605f78a00b936132cb47db13c15c2b56fa5e
                                    • Opcode Fuzzy Hash: 48530621e337c3bc95c9742e65efd2931dca66ee0a45ef8abf044a7ccf887c04
                                    • Instruction Fuzzy Hash: A1C1C2B1D042689BEB21CB28DC416EABBB5EF85310F1480FAD44DA7255D6385FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: c639c2e9671f76f2cea39f651a55cad2985b24a0e8426f451829d2145220683c
                                    • Instruction ID: f2e26e411e70b683345b0a75ae135288692e3f4825ffe059e68d57cef7ad772d
                                    • Opcode Fuzzy Hash: c639c2e9671f76f2cea39f651a55cad2985b24a0e8426f451829d2145220683c
                                    • Instruction Fuzzy Hash: E6C1B1B1D042689BEB21CB28DC416EAB7B5EF85300F1480FAD44DA7655D6385FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 417c221c039cba8a70c980f34202d5965cb8327d2cc595b091b6a2b0553acd7a
                                    • Instruction ID: d5c0261a08b220fab25417fb70710a0c3213c0abae8eaa6615f73d2c4ec1014a
                                    • Opcode Fuzzy Hash: 417c221c039cba8a70c980f34202d5965cb8327d2cc595b091b6a2b0553acd7a
                                    • Instruction Fuzzy Hash: 63C1A0B1D042689BEB21CB28DC416EAB7B5EF89310F1480FAD44DA7255E6395FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: c3465f3d71e806301fa3f7ffb86aad1d29bf72c56369853b1ad61710e2431eeb
                                    • Instruction ID: df501c10d635e8dc3141c6ececbf0a09ac2c060f0da022ed57e65820b2bc47dd
                                    • Opcode Fuzzy Hash: c3465f3d71e806301fa3f7ffb86aad1d29bf72c56369853b1ad61710e2431eeb
                                    • Instruction Fuzzy Hash: CCC1B0B1D042689BEB21CB28DC816EAB7B5EF85310F1480FAD44DA7251E6395FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 9f9f02aee59f7943ccd171892d063a1b6b4d04803551356c427d495a96b67d8f
                                    • Instruction ID: b92968b5be61177de0b1200211831dffeda55790e6df7f5fbb9f53647f29423e
                                    • Opcode Fuzzy Hash: 9f9f02aee59f7943ccd171892d063a1b6b4d04803551356c427d495a96b67d8f
                                    • Instruction Fuzzy Hash: 12B1C1B1D082689BEB218B24DC817EAB7B5EF85300F1480FAD44DA7655E6395FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: a3c68ba5a0ae4b3f9ede6ce816736ec0b82a7bf61cda62af62c2f489b9d9c8b9
                                    • Instruction ID: 935434096ba4d62ba469034e5d8cc68d66f5c4ea752ea523fc9c6a9215c3e34a
                                    • Opcode Fuzzy Hash: a3c68ba5a0ae4b3f9ede6ce816736ec0b82a7bf61cda62af62c2f489b9d9c8b9
                                    • Instruction Fuzzy Hash: DDB1C1B1D052689BEB218B28DC817EAB7B5EF85300F1480FAD44DA7255E6395FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: a2c9d2bfe0c50d5c10bfb20442ecdb689ee5930378d7364bd96a25402b470ee9
                                    • Instruction ID: c7b55734e6b429011864a5f6efb1e13d2a13bb2cbbc8e5d70144b3e2a743a9ab
                                    • Opcode Fuzzy Hash: a2c9d2bfe0c50d5c10bfb20442ecdb689ee5930378d7364bd96a25402b470ee9
                                    • Instruction Fuzzy Hash: EAB1B1B1D042689BEB218B24DC417EAB7B5EF85310F1480FAD44DA7255E6395FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: cb31a84abb640be04d62deb8061670e7ab0268140fa3efd4ffbad041c17b6da3
                                    • Instruction ID: 5bf3fcd9d13f19252e2fe1e337166c3e15d7e55d710abd582675345d10a65f14
                                    • Opcode Fuzzy Hash: cb31a84abb640be04d62deb8061670e7ab0268140fa3efd4ffbad041c17b6da3
                                    • Instruction Fuzzy Hash: 60B1BFB1D042689BEB21CB28DC816EAB7B5EF95300F1480FAE44DA7251E6355FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 9ed5337de668e76555b6d822bd6acee58fa74b02fb10ff32de9dd520817a5475
                                    • Instruction ID: 9dde4b69f558d91ae12d5af8f21b3d521d88c8d4bcb4c54448c9cda7ee094b83
                                    • Opcode Fuzzy Hash: 9ed5337de668e76555b6d822bd6acee58fa74b02fb10ff32de9dd520817a5475
                                    • Instruction Fuzzy Hash: A9B1AFB5D182688BEB218B28DC816EAB7B5EF85300F1480FAD44DA7251E6355FC6CF52
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: ee8bcabaf6cf8e0c50a572676a6a49afd8705cc3655e00f9b3bedd3338c817d2
                                    • Instruction ID: 5a41e83c0bedf8e6d892f2a6901989d55ea13818cb7d9c24e8643f3d1306ec4a
                                    • Opcode Fuzzy Hash: ee8bcabaf6cf8e0c50a572676a6a49afd8705cc3655e00f9b3bedd3338c817d2
                                    • Instruction Fuzzy Hash: A0A1A0B1D042A88BEB21CB28DC417EAB7B5EF89300F1480EAD44DA7255E6355FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 493e42f7a3e062a671232b6eecc6bbd0d33d34aa4ad799f1b5d8bf55b8fc890e
                                    • Instruction ID: 11e350774c19bbf98ab8f09354a04048412cc2640de4bfa90c158ae90d5452d8
                                    • Opcode Fuzzy Hash: 493e42f7a3e062a671232b6eecc6bbd0d33d34aa4ad799f1b5d8bf55b8fc890e
                                    • Instruction Fuzzy Hash: F3B191B5D042A88BEB21CF24DC416EAB7B5EF89300F1480EAD44DA7251E6355FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: d7aca3b492e8fda41cdb94869fe373e110c29d01aeb374921c02df84d986ff5e
                                    • Instruction ID: b791541e8eaea9c70af09ae2767f184314153439e9f043a9c33c64f0fb3e53d5
                                    • Opcode Fuzzy Hash: d7aca3b492e8fda41cdb94869fe373e110c29d01aeb374921c02df84d986ff5e
                                    • Instruction Fuzzy Hash: CAA19FB5D042A89BEB21CF28DC416EAB7B5EF89300F1480EAD44DA7255E6355FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 41c7d3bd10d69fd64efbf65a09572c0039eed2639ebc93dd04def2b0f59454ce
                                    • Instruction ID: bf7ec601865a2c15844b3c4393e72f340a1f09c8bfcfe7a2845f9a0f64145d90
                                    • Opcode Fuzzy Hash: 41c7d3bd10d69fd64efbf65a09572c0039eed2639ebc93dd04def2b0f59454ce
                                    • Instruction Fuzzy Hash: BAA19EB5D042689BEB21CF28DC816EAB7B5EF89300F1480EAD44DA7251E6355FC6CF12
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 0092E56B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 91f9873f1f828d18258c2f1c9a67aec2142c3cc22d78f5cb3377d3157bef2be8
                                    • Instruction ID: fa5b67bdb8f88b7d6f2f2234d936348c60abf3910b4841cc8e6895b84aac5602
                                    • Opcode Fuzzy Hash: 91f9873f1f828d18258c2f1c9a67aec2142c3cc22d78f5cb3377d3157bef2be8
                                    • Instruction Fuzzy Hash: 6CA1AFB5D042A88BEB21CB28DC416EAB7B5EF99300F1480EAD44DA7251E6355FC6CF12
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0041A765
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: c18102a9b549633216f5c74cc17ab2ee03f2400ae3c4efad30dd2fb6268b7355
                                    • Instruction ID: f9afdad81f8fdcf05d3c57e3674116885cebb6d07487b47504391e48ceab0545
                                    • Opcode Fuzzy Hash: c18102a9b549633216f5c74cc17ab2ee03f2400ae3c4efad30dd2fb6268b7355
                                    • Instruction Fuzzy Hash: E75104B2D012259FE7208A14DC98BEB7B79EB94314F1440F7DD4DA7380D6789ED18E92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e55f027079e7cb60564dead9fd78a46f336e1de9c2e35134dc6d9648d162ecdf
                                    • Instruction ID: af672f1ddbcbca21a66a083a011ada9d808f16edd7cf67b666e278050dca3564
                                    • Opcode Fuzzy Hash: e55f027079e7cb60564dead9fd78a46f336e1de9c2e35134dc6d9648d162ecdf
                                    • Instruction Fuzzy Hash: 5CE147B2D046649FE720CA24EC94BEB7B78EB82310F1541FAD84E67245D6385EC5CF92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3d776b3173f28ee399caa221a489f5f5ab3d8fbc779cfd1bffe9c82644a3ca4
                                    • Instruction ID: 27a5f65e7a979b69470fca795de07bf0ede97b903ac247ba86d93cf21b95d44c
                                    • Opcode Fuzzy Hash: c3d776b3173f28ee399caa221a489f5f5ab3d8fbc779cfd1bffe9c82644a3ca4
                                    • Instruction Fuzzy Hash: 6C9156B2D052249FF7148B24EC45BEB7B78EF81310F1501FAD84E5B285E6386EC0CA92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 352f2487a9d62c9517a5208b56053ed359e218441c90e30d5cf73d8cfaf54a99
                                    • Instruction ID: 6d5907c18fd99993b4908c18013b9059f2842aba8ff705e4c9f8ccb2fa7a256d
                                    • Opcode Fuzzy Hash: 352f2487a9d62c9517a5208b56053ed359e218441c90e30d5cf73d8cfaf54a99
                                    • Instruction Fuzzy Hash: CD9155A2D056249FE7148B24EC45BEB7B78EF91310F0501FAD94E5B281E6786EC0CB92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93c1b6dd75e3f448bedbbe60c47beef4ef8e6f32f39c858370462287ae324694
                                    • Instruction ID: 59c6e5d88634a470f18c84064855b207062eb1d3c79530f86991056e0817b08c
                                    • Opcode Fuzzy Hash: 93c1b6dd75e3f448bedbbe60c47beef4ef8e6f32f39c858370462287ae324694
                                    • Instruction Fuzzy Hash: 018147A2D085748FE7148B24EC557EB7B74EF91310F0501FAD88E6A286E6385EC1CB92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 38f2c22fcb8c161386fdd9af565e69adcd0a142fbdbfea471650a6e5ef1fc234
                                    • Instruction ID: 52046558d8c0d24a528bbbb3f7fa207788e9bf76f4e305d8472ecbc5c6e6b4eb
                                    • Opcode Fuzzy Hash: 38f2c22fcb8c161386fdd9af565e69adcd0a142fbdbfea471650a6e5ef1fc234
                                    • Instruction Fuzzy Hash: 197146A2D056649FE7148B24EC45BEA7B74EF91300F0501FAD94E5B281E6786EC0CF92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4594d1129ccd24c4aef7ef681547a68d34dabb95191ed0ba44d4d5a32f0dcbac
                                    • Instruction ID: 579dff5af24488d864ab53b47564ed30b1220b357f2a887eaf74f607f5b41145
                                    • Opcode Fuzzy Hash: 4594d1129ccd24c4aef7ef681547a68d34dabb95191ed0ba44d4d5a32f0dcbac
                                    • Instruction Fuzzy Hash: 1A7168A2D046648FE7149B24EC457EB7B74EF91300F0501FAD94E5B281E6796EC0CB92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17e172ba863579ed008d12eba08a48b321337b4d2d42deeae5d5033ffb2c369b
                                    • Instruction ID: a10a35ccddaa9fa7c252b380811c9d920318840d0b7f7b14dbe2e559e8d4c218
                                    • Opcode Fuzzy Hash: 17e172ba863579ed008d12eba08a48b321337b4d2d42deeae5d5033ffb2c369b
                                    • Instruction Fuzzy Hash: 7A417AB2D045249FF3148660EC95BE77B68EF42310F1442FED94E9A2C1E6786EC5CA93
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f87dac4123fe516796939c386e0ab43032901f91499b0ef24b7da3bb22314316
                                    • Instruction ID: 1da655831cfdd130df01c16998e03c9d6daf5d788cf0f9073c478780303734f5
                                    • Opcode Fuzzy Hash: f87dac4123fe516796939c386e0ab43032901f91499b0ef24b7da3bb22314316
                                    • Instruction Fuzzy Hash: 824168B2D046649FF3109660EC55BE77B68EF42310F0542FAD88EA61C1D6786EC5CE92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 151 908f82-9093e3 call 908f91 VirtualAllocEx 155 9093f7-909410 151->155 156 909416-909552 call 909553 155->156 157 90b409-90b410 155->157 158 90b412-917e39 157->158 159 90b449-90b48f call 90b471 157->159 174 90b495-90b4ad 159->174 175 90b490 call 90b49d 159->175 176 90b4b3-90b4b8 174->176 177 90b4ae call 90b4bb 174->177 175->174 177->176
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: E$P$V$a$c$e$i$l$o$r$r$t$t$t$u$x
                                    • API String ID: 4275171209-4025948460
                                    • Opcode ID: ac64d7f13e9c15808d18cf4858f2769c35e62be556248496d9be5878dbbeedf6
                                    • Instruction ID: b03c6ef51bac94a664c58d309e2e6be3053c93c478b8dedac05ec1dde8ccecd3
                                    • Opcode Fuzzy Hash: ac64d7f13e9c15808d18cf4858f2769c35e62be556248496d9be5878dbbeedf6
                                    • Instruction Fuzzy Hash: 77415261C082E88EEB21C668CC447DABBB4AB15344F0441EAD98D662C2D77D1F85CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 178 908f91-909410 VirtualAllocEx 181 909416-909552 call 909553 178->181 182 90b409-90b410 178->182 183 90b412-917e39 182->183 184 90b449-90b48f call 90b471 182->184 199 90b495-90b4ad 184->199 200 90b490 call 90b49d 184->200 201 90b4b3-90b4b8 199->201 202 90b4ae call 90b4bb 199->202 200->199 202->201
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000002), ref: 009093BF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: E$P$V$a$c$e$i$l$o$r$r$t$t$t$u$x
                                    • API String ID: 4275171209-4025948460
                                    • Opcode ID: abd856786997a5805a1c96da4d39880b379d785c000a8b34db9fc76ae62d07b7
                                    • Instruction ID: bc7d6f3b0a1f5b5790e91e72d678df10703eb005afd68414d83d385b19fc2d43
                                    • Opcode Fuzzy Hash: abd856786997a5805a1c96da4d39880b379d785c000a8b34db9fc76ae62d07b7
                                    • Instruction Fuzzy Hash: A2415161C082E89EEB21C658CC487DABBB4AB15354F0481E6D98D762C2D77D1FC5CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 203 909354-9093e3 VirtualAllocEx 205 9093f7-909410 203->205 206 909416-909552 call 909553 205->206 207 90b409-90b410 205->207 208 90b412-917e39 207->208 209 90b449-90b48f call 90b471 207->209 224 90b495-90b4ad 209->224 225 90b490 call 90b49d 209->225 226 90b4b3-90b4b8 224->226 227 90b4ae call 90b4bb 224->227 225->224 227->226
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000002), ref: 009093BF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: E$P$V$a$c$e$i$l$o$r$r$t$t$t$u$x
                                    • API String ID: 4275171209-4025948460
                                    • Opcode ID: a5409c74580e52627428fb5bbd63772c2a95dbf5b5cd0229b4c51da6d93c0f11
                                    • Instruction ID: c13e241ea231f57f1640613e4bb7125566b497fa46500ad4427805ed33aa33b3
                                    • Opcode Fuzzy Hash: a5409c74580e52627428fb5bbd63772c2a95dbf5b5cd0229b4c51da6d93c0f11
                                    • Instruction Fuzzy Hash: CF416071C082E88EEB20C618CC447DABBB4AB55344F0481EAD98D762C2D77E1EC58FA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 401 41b0a6-41b18a call 41b0bb call 41b0f3 call 41b167 411 41b1cd-41b218 401->411 412 41b18c-41b1c8 401->412 413 41b25b-41b313 call 41b314 411->413 414 41b21a-41b256 411->414 415 41b574-41b57b 412->415 413->415 414->415 417 41b57d-41b5b9 415->417 418 41b5be-41b6dd 415->418 429 41c8eb-41c90a VirtualProtect 417->429 419 41b6e1-41b6e4 418->419 420 41b6df 418->420 423 41b729-41b730 419->423 420->423 426 41b732 423->426 427 41b734-41b737 423->427 430 41b77c-41b826 426->430 427->430 431 41c943-41ca7e call 41c971 call 41ca46 call 41ca72 429->431 432 41c90c-41c93e 429->432 438 41b828-41b866 call 41b856 430->438 439 41b86b-41b880 430->439 435 41cab5 431->435 432->435 435->435 444 41bd5f-41bd66 438->444 442 41b893-41b924 call 41b8b3 439->442 443 41b882-41b88e 439->443 442->444 443->444 449 41be08-41be23 call 41be24 444->449 450 41bd6c-41bda6 call 41bd7d call 41bd9a 444->450 450->429
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: BA7K$KMO?
                                    • API String ID: 544645111-982559411
                                    • Opcode ID: 99ddc2b67476b2347748145275dc7ec355c2bfc88c4de2235ec212d4dc09f047
                                    • Instruction ID: 8d375e5a3e5d64dc31fa456cfe304ae375048e662fcce7c09d6158256a77fdec
                                    • Opcode Fuzzy Hash: 99ddc2b67476b2347748145275dc7ec355c2bfc88c4de2235ec212d4dc09f047
                                    • Instruction Fuzzy Hash: 5141A9F2D48214AFF7108A25DC84BEB7B29EB91314F1480BBE84C56580D67C4FC28AA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 466 41b0bb-41b18a call 41b0f3 call 41b167 474 41b1cd-41b218 466->474 475 41b18c-41b1c8 466->475 476 41b25b-41b313 call 41b314 474->476 477 41b21a-41b256 474->477 478 41b574-41b57b 475->478 476->478 477->478 480 41b57d-41b5b9 478->480 481 41b5be-41b6dd 478->481 492 41c8eb-41c90a VirtualProtect 480->492 482 41b6e1-41b6e4 481->482 483 41b6df 481->483 486 41b729-41b730 482->486 483->486 489 41b732 486->489 490 41b734-41b737 486->490 493 41b77c-41b826 489->493 490->493 494 41c943-41ca7e call 41c971 call 41ca46 call 41ca72 492->494 495 41c90c-41c93e 492->495 501 41b828-41b866 call 41b856 493->501 502 41b86b-41b880 493->502 498 41cab5 494->498 495->498 498->498 507 41bd5f-41bd66 501->507 505 41b893-41b924 call 41b8b3 502->505 506 41b882-41b88e 502->506 505->507 506->507 512 41be08-41be23 call 41be24 507->512 513 41bd6c-41bda6 call 41bd7d call 41bd9a 507->513 513->492
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: BA7K$KMO?
                                    • API String ID: 544645111-982559411
                                    • Opcode ID: b3b61a8ac74895e74504ec25524f4e5a51f69929cc0d455e9b33d0f62f99b9a5
                                    • Instruction ID: fe2ee70aaf04f7e3277a0ecce4d31d350e849c2cd53664e07033b2e423a8cb10
                                    • Opcode Fuzzy Hash: b3b61a8ac74895e74504ec25524f4e5a51f69929cc0d455e9b33d0f62f99b9a5
                                    • Instruction Fuzzy Hash: B6319BF2D44214AFF7108A24DD84BEB7729EB90314F10817BE80D56580D67C0FC28EA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 529 41b0d2-41b18a call 41b0f3 call 41b167 536 41b1cd-41b218 529->536 537 41b18c-41b1c8 529->537 538 41b25b-41b313 call 41b314 536->538 539 41b21a-41b256 536->539 540 41b574-41b57b 537->540 538->540 539->540 542 41b57d-41b5b9 540->542 543 41b5be-41b6dd 540->543 554 41c8eb-41c90a VirtualProtect 542->554 544 41b6e1-41b6e4 543->544 545 41b6df 543->545 548 41b729-41b730 544->548 545->548 551 41b732 548->551 552 41b734-41b737 548->552 555 41b77c-41b826 551->555 552->555 556 41c943-41ca7e call 41c971 call 41ca46 call 41ca72 554->556 557 41c90c-41c93e 554->557 563 41b828-41b866 call 41b856 555->563 564 41b86b-41b880 555->564 560 41cab5 556->560 557->560 560->560 569 41bd5f-41bd66 563->569 567 41b893-41b924 call 41b8b3 564->567 568 41b882-41b88e 564->568 567->569 568->569 574 41be08-41be23 call 41be24 569->574 575 41bd6c-41bda6 call 41bd7d call 41bd9a 569->575 575->554
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: BA7K$KMO?
                                    • API String ID: 544645111-982559411
                                    • Opcode ID: 60c0dc815876eb394188417ce6fb4030e392055f8047786d3cdad65afce3ac44
                                    • Instruction ID: 518e9351469f8adbaf58ca121205b2dabd89fe75e7849debeaee1ec382721bcb
                                    • Opcode Fuzzy Hash: 60c0dc815876eb394188417ce6fb4030e392055f8047786d3cdad65afce3ac44
                                    • Instruction Fuzzy Hash: C63146F2D44604AFFB108A24DDC5BEB7765FB90314F2081BBE84D96580C67C4EC28EA6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 591 41b0dd-41b18a call 41b0f3 call 41b167 598 41b1cd-41b218 591->598 599 41b18c-41b1c8 591->599 600 41b25b-41b313 call 41b314 598->600 601 41b21a-41b256 598->601 602 41b574-41b57b 599->602 600->602 601->602 604 41b57d-41b5b9 602->604 605 41b5be-41b6dd 602->605 616 41c8eb-41c90a VirtualProtect 604->616 606 41b6e1-41b6e4 605->606 607 41b6df 605->607 610 41b729-41b730 606->610 607->610 613 41b732 610->613 614 41b734-41b737 610->614 617 41b77c-41b826 613->617 614->617 618 41c943-41ca7e call 41c971 call 41ca46 call 41ca72 616->618 619 41c90c-41c93e 616->619 625 41b828-41b866 call 41b856 617->625 626 41b86b-41b880 617->626 622 41cab5 618->622 619->622 622->622 631 41bd5f-41bd66 625->631 629 41b893-41b924 call 41b8b3 626->629 630 41b882-41b88e 626->630 629->631 630->631 636 41be08-41be23 call 41be24 631->636 637 41bd6c-41bda6 call 41bd7d call 41bd9a 631->637 637->616
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: BA7K$KMO?
                                    • API String ID: 544645111-982559411
                                    • Opcode ID: 853b9ca04643e4498b8ce249aaff31effd0ee0d80ec036a84c1b7f337f9717a2
                                    • Instruction ID: a4299aee007434edc4f1fad4cfc399e56ab5149b6caf1286c9dc6a028abbf0ef
                                    • Opcode Fuzzy Hash: 853b9ca04643e4498b8ce249aaff31effd0ee0d80ec036a84c1b7f337f9717a2
                                    • Instruction Fuzzy Hash: D7315AF2D44214AFFB108A24DD85BFB7769EB91314F1081BBE84D56580D67C4FC28EA6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 653 8fd036-8fd69d CreateProcessW 663 8fd69f-917e39 653->663
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: AYVP$jjjj
                                    • API String ID: 963392458-1055777859
                                    • Opcode ID: 57a61e12a04aadf13632ff4f52ad7bc13d0528fbeb1a04166b50b0c9682dfa36
                                    • Instruction ID: a72999a2518c322e2fc7bad6b31835efab50b355a780aeee28319e3a5ec991b4
                                    • Opcode Fuzzy Hash: 57a61e12a04aadf13632ff4f52ad7bc13d0528fbeb1a04166b50b0c9682dfa36
                                    • Instruction Fuzzy Hash: 163148F2D0871C9BF3248920EC85BF77779F380310F2441B9EA0AA6684DA7D5FC18A51
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: e13cb54327555cebc8225b1d9ab84f1113d8ceb505d83e68055340efedb2236a
                                    • Instruction ID: 48907e132284ba4da0e895d68d97b66702144d675898c560e1bb1177acf77d4c
                                    • Opcode Fuzzy Hash: e13cb54327555cebc8225b1d9ab84f1113d8ceb505d83e68055340efedb2236a
                                    • Instruction Fuzzy Hash: 6D71E3B2C091249BE7248B24EC457FB7778EF14310F1445FAD80D96685EA3D5EC58F52
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID: R
                                    • API String ID: 2738559852-1968290334
                                    • Opcode ID: 7420c00f8ed87e78f41e9eda3788c77f6466de3fb47cc0b3e30b2d930fa29b42
                                    • Instruction ID: bc6c480e5ae8a040bf995454998ee0423a458dd76070a2018b2816b4c0b4b287
                                    • Opcode Fuzzy Hash: 7420c00f8ed87e78f41e9eda3788c77f6466de3fb47cc0b3e30b2d930fa29b42
                                    • Instruction Fuzzy Hash: D15134F2D0511A9BE7248B24DD44BFB7BBAEFD4310F0581BAE50996240E2394EC08F91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Ph?
                                    • API String ID: 0-2294233904
                                    • Opcode ID: 702e1306a79956221191506d570cff936ffe6e866dbe02b021f55942832614ac
                                    • Instruction ID: e124e5ec8c0205c7fdb5108dd6cd4ceed52320e03f59b65a3fe0928a8405c738
                                    • Opcode Fuzzy Hash: 702e1306a79956221191506d570cff936ffe6e866dbe02b021f55942832614ac
                                    • Instruction Fuzzy Hash: FD51E4B1D145289BFB348B18EC45BEAB7B8FF54310F1442FAD90D62280EA785FC68E40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Ph?
                                    • API String ID: 0-2294233904
                                    • Opcode ID: 53a87a705510311d901611027d713b48160e557bd0f5dfe9a1068ceebf4da2af
                                    • Instruction ID: bc7a9007480628cad983ab1b9ba242408d286fe138f80baf22f9f62564623545
                                    • Opcode Fuzzy Hash: 53a87a705510311d901611027d713b48160e557bd0f5dfe9a1068ceebf4da2af
                                    • Instruction Fuzzy Hash: 0651D3B2D545289BFB348B18DC45BEAB7B8FF54310F1442FAD90D62280EA785FC68E51
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 0e49e0b74dd3b5c4f80a5c6d521b45afacf2138b859b315511409426c71b6e4a
                                    • Instruction ID: f5a2093db8a428e70826003b6e8d4705d943c0519463c1447c8fd4ecfcae38a6
                                    • Opcode Fuzzy Hash: 0e49e0b74dd3b5c4f80a5c6d521b45afacf2138b859b315511409426c71b6e4a
                                    • Instruction Fuzzy Hash: D541F4B2D4431C9BF3248A24DC85BF77769F784310F2441BAEE0DA6684DA7D5FC18A91
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: fc943ff3e22aba6163275a2c5525feb81b2eddd97a8bb28c81ff58a182882f7f
                                    • Instruction ID: af4c9915508c77027e8281b4d687b7caa9669c5c6b413c36cf42f25fdf20a9f6
                                    • Opcode Fuzzy Hash: fc943ff3e22aba6163275a2c5525feb81b2eddd97a8bb28c81ff58a182882f7f
                                    • Instruction Fuzzy Hash: 0041F5B2D4431C9BF3248A24EC85BF77769F784310F2441BAEE0E66684DA7D5FC18A91
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID: :PDA
                                    • API String ID: 2738559852-1201672814
                                    • Opcode ID: 5432a28f903352d3cd205a5f21f45ec29890da8dc9ad520dcd2c50fefd7f0987
                                    • Instruction ID: 6d904a6addae68954b70ef1824fd84b7144ef99378f8d210dad2474a715c6ecc
                                    • Opcode Fuzzy Hash: 5432a28f903352d3cd205a5f21f45ec29890da8dc9ad520dcd2c50fefd7f0987
                                    • Instruction Fuzzy Hash: C84149F3E05514AFF7208A24DC49AE77B78EBC4311F1541FAE50E8A281E27C5AC68E52
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 2cd33a3824cbd3e42e59681beb5d0caa253d403d42e3c2b12ee9f94a57fbc975
                                    • Instruction ID: a37290f424a0b0b4898bd5c70240da52ebb319f06ee663022d33edafb5fe80e4
                                    • Opcode Fuzzy Hash: 2cd33a3824cbd3e42e59681beb5d0caa253d403d42e3c2b12ee9f94a57fbc975
                                    • Instruction Fuzzy Hash: DA4107F2D4831CABF3244920EC85BFB7669F780314F2441BAEB0AA56C4DA7D5FC58951
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: fa67a8eeb3d594c4a33976883dcdc01ab523998dad10d5d6dc3c5ea244ad59b5
                                    • Instruction ID: 93aa1d17d19047b5c9393bde88e4d5daaaa3f15c2ca3b0bde03d45646b652a16
                                    • Opcode Fuzzy Hash: fa67a8eeb3d594c4a33976883dcdc01ab523998dad10d5d6dc3c5ea244ad59b5
                                    • Instruction Fuzzy Hash: B841F7F2D0431CABF3244920EC85BF77669F780314F2441BAEA0AA6684EA7D5FC58951
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 71548ff588c8a25b89e926bde5db5f08b0f2232d596427d4319eb5e190d85d70
                                    • Instruction ID: ad27ccbe0ebf5d6894a6903426bb98f833ce5362b8ba8de4c66f637afb5ba0b2
                                    • Opcode Fuzzy Hash: 71548ff588c8a25b89e926bde5db5f08b0f2232d596427d4319eb5e190d85d70
                                    • Instruction Fuzzy Hash: 053107B2D4532D5BE7208A65DC54BF6B77AFB44310F1480FAEA0DA6680D2BD1FC18E91
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 4c31dc82b892778bf38b3542b782e6ce7ba42086a001c0cfe11767495fa72d38
                                    • Instruction ID: 1665148933523f6769802c896803ceab70bc67ad574f13d10fe09e9c1579c24f
                                    • Opcode Fuzzy Hash: 4c31dc82b892778bf38b3542b782e6ce7ba42086a001c0cfe11767495fa72d38
                                    • Instruction Fuzzy Hash: F631E1F3D541259BF7388A18EC8ABFB7768EB50310F1441BAD90A91280E5BC5FC18E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 8ad9bddbd8eae0ce8c66993eb1f206818897a0a6f52c4beeaf4a53591353a7e8
                                    • Instruction ID: b2610c0b1a6617aa825d487c863afdfe8507f130c56a8d9503642892cb956bc2
                                    • Opcode Fuzzy Hash: 8ad9bddbd8eae0ce8c66993eb1f206818897a0a6f52c4beeaf4a53591353a7e8
                                    • Instruction Fuzzy Hash: B53106F3D15124ABF7388A14EC55BFB7368EB94310F1441BAD90E96680E5BD4FC18E51
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 490c7e86cc4ab99c72bf810ba5f23c468464c4b7f85be99d9850f39b35cee4ae
                                    • Instruction ID: 7287840ef33a1a37bc777b5874f0692c4a44d21eeeaa9fced6114c609bd5497d
                                    • Opcode Fuzzy Hash: 490c7e86cc4ab99c72bf810ba5f23c468464c4b7f85be99d9850f39b35cee4ae
                                    • Instruction Fuzzy Hash: 4231D0F3D141259BF7348A18EC89BFB77A8EB90310F1441BAD90EA1680E5BC5FC58E11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: KMO?
                                    • API String ID: 544645111-3566493764
                                    • Opcode ID: d02b30af1ebc46168b3cc64ff19230de9e7d2acd7c0577e19570f0e8984fc77a
                                    • Instruction ID: a8833e74c5dfe6ae15aa5f7d3f56686113766aa345adcb28aac52213c8f94dbd
                                    • Opcode Fuzzy Hash: d02b30af1ebc46168b3cc64ff19230de9e7d2acd7c0577e19570f0e8984fc77a
                                    • Instruction Fuzzy Hash: ED3159F2D44214AFFB108A24DD84BEB7769EB90314F2581BBE80C56680D67C0FC28E96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: f2d68a9fec70fb9cc1551676e96618bbc0eebe987a28b83d6f7907a976b905c0
                                    • Instruction ID: e2aa843fd7baae044f1b3cf7ead82fe3bf09f9247c50ffd61aacab1e653596b2
                                    • Opcode Fuzzy Hash: f2d68a9fec70fb9cc1551676e96618bbc0eebe987a28b83d6f7907a976b905c0
                                    • Instruction Fuzzy Hash: 5331F6F1D4936D5BE7218A64DC54BF6B77AFB44300F1444F9EA0DA6284D2BD1FC18A50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: a55d42a32fb0449322a8a1dc0ff1a3912b3131c29a802282ac1bd1e5f17bd2f5
                                    • Instruction ID: ced753451ed1c6c6de6f392274cc7855d6b1cd1124cc913e1b8eca6d21b4c9ab
                                    • Opcode Fuzzy Hash: a55d42a32fb0449322a8a1dc0ff1a3912b3131c29a802282ac1bd1e5f17bd2f5
                                    • Instruction Fuzzy Hash: A331F4F2D4532D5BE7208A60DC54BF6B77AFB44310F1480F9EA0DA6680D6BD1FC18A91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 6675f78076dc058b8477b674f3f583a0506f49036ba4e3603563ee60faa9ef2a
                                    • Instruction ID: af4ba5d0648222fbfd4b874736b52c25b69d2a30b7f237d84ec5e1309303a568
                                    • Opcode Fuzzy Hash: 6675f78076dc058b8477b674f3f583a0506f49036ba4e3603563ee60faa9ef2a
                                    • Instruction Fuzzy Hash: DB31C3F2D0531D6BF7208A60DC51BF6B679EB44710F1480B5EA0DA6280D2BD5BC18A51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 7e2d97cce9af66975237be6cf2724ebf51eb3c49c9c9eb1c5b3bc30886269d9b
                                    • Instruction ID: d43acfbdef775c6cb51d66a0776e3f1c423be21634ee6153e8ca3f980a71b77f
                                    • Opcode Fuzzy Hash: 7e2d97cce9af66975237be6cf2724ebf51eb3c49c9c9eb1c5b3bc30886269d9b
                                    • Instruction Fuzzy Hash: 5731F5F1D0431D5BE7218A61DC95BF6B77AFB44300F1480F5EA0CA5280E2BD1BC18E91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 7f67a42364fa3deebc6ead6756adaca5c835abcf9f3bb1e97c29226214b3ecab
                                    • Instruction ID: 7f1a551617350e7baf44e492da0c0e4d01633e5aedb9151eb1da708eddf0a20a
                                    • Opcode Fuzzy Hash: 7f67a42364fa3deebc6ead6756adaca5c835abcf9f3bb1e97c29226214b3ecab
                                    • Instruction Fuzzy Hash: 2E31E7F1D4532D5BE7218A61DC95BF6B77AFB44310F1480F5EA0CA5180D2B91FC18E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 95f306905971f6d931cde9d6269b92bd6b8f24129d9230b6b6e3d66d04b0db07
                                    • Instruction ID: b1786956845bfbfd95173d147e965411f6cd6b6d88d389aabca00a283e1273d0
                                    • Opcode Fuzzy Hash: 95f306905971f6d931cde9d6269b92bd6b8f24129d9230b6b6e3d66d04b0db07
                                    • Instruction Fuzzy Hash: 5B218AE2C041389BF7204A24EC09BFB3768EB40310F1446BBE80D95985DB7D4FC9DA92
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID: FZWS
                                    • API String ID: 3070290716-4186486854
                                    • Opcode ID: 603d92c9521ec5b4c15847d1b22ea47be2f3016f587f1c45e2df1241eefd7b30
                                    • Instruction ID: daa70a0f0b3ca0bf90d91e572d052b112d8ddff4875c7187838b6c3e153f0be1
                                    • Opcode Fuzzy Hash: 603d92c9521ec5b4c15847d1b22ea47be2f3016f587f1c45e2df1241eefd7b30
                                    • Instruction Fuzzy Hash: A641C471D045288FDB24CB69CD84BEABBB6EBD4305F1482EAD40C67294C7785BC9CE46
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: e780a790220883ea22df20e9b8649ae09045a8e63348ee44d9e2f26a2ef325de
                                    • Instruction ID: 2d6e3152b6493ac14451be529b9174dccca85504a43fee981c9a863e82fac5ea
                                    • Opcode Fuzzy Hash: e780a790220883ea22df20e9b8649ae09045a8e63348ee44d9e2f26a2ef325de
                                    • Instruction Fuzzy Hash: 1C3149B1D0834C9FF7208A20DC85BF67736F780310F2841FAEA09A6685DA7D1FC58A51
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 4a23adc0df1eeed32f9b51507e8ad81afeefbea58b7c7a6aa5a10580896975e9
                                    • Instruction ID: 4c65c1436f9fc67343a195ebec73084628de453c2450f39f7c1b7b7f5e8cf5ba
                                    • Opcode Fuzzy Hash: 4a23adc0df1eeed32f9b51507e8ad81afeefbea58b7c7a6aa5a10580896975e9
                                    • Instruction Fuzzy Hash: 713136B1E0834C9FE7248A20DC45FF67736FB80310F2841FAEA0999285DA7D5FC59A56
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: e0bd1b4241dc25f47ea99dbaf07e388f3b30ee26c7c1d768c1dcf5709500c9fb
                                    • Instruction ID: 77d06341b495a0b7d91db1c43b1b9d3f5d7bda9305c5ed17ea6865da40f342d9
                                    • Opcode Fuzzy Hash: e0bd1b4241dc25f47ea99dbaf07e388f3b30ee26c7c1d768c1dcf5709500c9fb
                                    • Instruction Fuzzy Hash: 9A21E5F3D151249BF7348A18DC95BFA73A8EB50300F1441BAD90DA6680E5BC4FC08E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 279e80c552c357aa643471d0816545c1a78a8fa0ea86862ef44f9b523458aab9
                                    • Instruction ID: 8b83ca7460e753b19c40e29a06e645b7551a24c94704d75ce7f3278d164c5f16
                                    • Opcode Fuzzy Hash: 279e80c552c357aa643471d0816545c1a78a8fa0ea86862ef44f9b523458aab9
                                    • Instruction Fuzzy Hash: F821D3F3C191259BF7348A18DC9ABFA77A8EB10300F1801FAD90E95280E6BD4FD18E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: KMO?
                                    • API String ID: 544645111-3566493764
                                    • Opcode ID: 13bba247a31b2437c847d6cd7700bdefbaf720da2429000bb8402dd6dfb22b41
                                    • Instruction ID: e1d9a0bce33dd32428a726e34ee833ea0d9f13118be23c55441caf71ba35fc79
                                    • Opcode Fuzzy Hash: 13bba247a31b2437c847d6cd7700bdefbaf720da2429000bb8402dd6dfb22b41
                                    • Instruction Fuzzy Hash: D22134F2D44614AEFB108A20DD89BEF7765EB95315F2081BBE90C95484D37C4FC28E9A
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: f9101f898db2d8a36029bf2420f67f32d0febad9086b9ba0feb513e37c3c0f5b
                                    • Instruction ID: a4de42779d0878d823eef028e57d2932bf120d08958013930acf399b8011e2bd
                                    • Opcode Fuzzy Hash: f9101f898db2d8a36029bf2420f67f32d0febad9086b9ba0feb513e37c3c0f5b
                                    • Instruction Fuzzy Hash: 4A21D6B1E4435C5BF7248920DC46BF67376F790310F2441B9EB0AA5284EA7D1FC18A55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 25bb8623a564ed418f2bbdf21d10ddfaff738355cacdf1c98409e42e47198c94
                                    • Instruction ID: 63ceca48a2ad569122c862bc20fddcd934def94a7f0c4625c0ad55f1bd10e874
                                    • Opcode Fuzzy Hash: 25bb8623a564ed418f2bbdf21d10ddfaff738355cacdf1c98409e42e47198c94
                                    • Instruction Fuzzy Hash: 8321C1F3D151259BFB348A18DC99BFAB368EB54300F1442FAD90DA6680E6BC5FC09E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 264b084a436f594f887778fdd8c0b62c4631b14476604caf6301183aa2824c94
                                    • Instruction ID: e1f2e376ecf5d7c5d358bd662e425a7c428dc8e86d7233fe0c9ffe389c05fa87
                                    • Opcode Fuzzy Hash: 264b084a436f594f887778fdd8c0b62c4631b14476604caf6301183aa2824c94
                                    • Instruction Fuzzy Hash: B721D3F3D151299BF7348A18DC99BFA7368EB50300F1402FAD90EA6680E6BC4FC18E51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 13edbb2fdf41a77a9e19a6e66c14fe9969c3d51963dafb9452386177e3f04e3e
                                    • Instruction ID: e24bcd7c4fac50d8b4df947110183f3ac8e0e3dbecd57b26d6a29915e4aabb5d
                                    • Opcode Fuzzy Hash: 13edbb2fdf41a77a9e19a6e66c14fe9969c3d51963dafb9452386177e3f04e3e
                                    • Instruction Fuzzy Hash: B32107B3C04128ABFB204A14EC49BFB7BA8EB04310F1445BAE84995585DABC4FC5DE92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 5a7669389fc93df8a6035789a8f8e7b5b67481c48d6e3d534e0a1dc96153f1fd
                                    • Instruction ID: cf4fa25a7b3f1a3e2cdacbeba368810d27f2fbedc17993374997cf1a7d2c731b
                                    • Opcode Fuzzy Hash: 5a7669389fc93df8a6035789a8f8e7b5b67481c48d6e3d534e0a1dc96153f1fd
                                    • Instruction Fuzzy Hash: 1C21C5F3D151259BF7348A18DC99BFA77A8EB14300F1401FAD90DA6680E6BC5FD08E51
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 20e4a1d0d062b5641eee1e6481d3c2aa0e3170e59113f32de7a91e4c47d48ca5
                                    • Instruction ID: 0464d99f81646e63d88de1cc39ef2957a472fbe6ceba742cc2cbea7de798d2d2
                                    • Opcode Fuzzy Hash: 20e4a1d0d062b5641eee1e6481d3c2aa0e3170e59113f32de7a91e4c47d48ca5
                                    • Instruction Fuzzy Hash: 6D11B1F1D4831D6AF7248A20EC56FF67269F754710F1442BAEB0A69280E6B92F804A91
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 98d240a77a5661396d6d414522bf6e4efd3ba03177167a572a44909354f3e273
                                    • Instruction ID: fddb57d6db7cd2118c4e4c53c2b33c8b20e23bf9c3c7ff219ddd76930c6c85aa
                                    • Opcode Fuzzy Hash: 98d240a77a5661396d6d414522bf6e4efd3ba03177167a572a44909354f3e273
                                    • Instruction Fuzzy Hash: 1D1193F3C105289BFB208A00EC4ABFB7368D714311F1446B7D90E96284D5BC5EC18E92
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 6dbf794af0b7b51a0206f17a9ed2908a6875852448d3b1778fbba4b10011bc09
                                    • Instruction ID: c79f232bb8887c4dbc2138d206d534bb8c87794f51bd57217e09681d08292ce3
                                    • Opcode Fuzzy Hash: 6dbf794af0b7b51a0206f17a9ed2908a6875852448d3b1778fbba4b10011bc09
                                    • Instruction Fuzzy Hash: FA1121F3C15428AEF7208900EC0ABFB72A8E754311F1849BBD94AD1580DABD4EC59E53
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 01c018c52c575891a276cd42e2595f61fe2e992ad3e96b7205e15bc9cb9c0f8d
                                    • Instruction ID: 1f4de1b970808d20159acbfd9953f06ab19c8ae8e35e4f15f1b9b27b319c6aaa
                                    • Opcode Fuzzy Hash: 01c018c52c575891a276cd42e2595f61fe2e992ad3e96b7205e15bc9cb9c0f8d
                                    • Instruction Fuzzy Hash: DB1127B1E4835C6BF7208A20DC41FF6737AF790711F1441F9EA05A5680E6791FC08E55
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 2ecf64a619fa96da74018a44daff10df9be3fa4bcb566f69a7bd62b9c9f93579
                                    • Instruction ID: 72b93e153e13225f9a23d561a623c8509fcd776a384e41278d8dba75c53f5d6e
                                    • Opcode Fuzzy Hash: 2ecf64a619fa96da74018a44daff10df9be3fa4bcb566f69a7bd62b9c9f93579
                                    • Instruction Fuzzy Hash: 681106E1E4830C6BF7208921EC46FBB7229F780714F1442BEFB0A945C0E6BD5B815996
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 6724b844fba6609ed399b22b107afa8332516e9823f71d012f07834db78573c3
                                    • Instruction ID: 5d0519e679868b308c9506ac35bebfd4bf06243a90b153247cd067cd829a0e6d
                                    • Opcode Fuzzy Hash: 6724b844fba6609ed399b22b107afa8332516e9823f71d012f07834db78573c3
                                    • Instruction Fuzzy Hash: 8B1127B1E0835C6AF7308A21DC46FB6B336F790710F1441BDE70A666C0EBBD2B804A84
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 51378c83972f23baa74f426988e41eeeb0f22dddb31f66947647f9d532d5da3c
                                    • Instruction ID: b2602d4758f474e69a3c132cc0aa61a73659b720234cc27e02c6631431e226b9
                                    • Opcode Fuzzy Hash: 51378c83972f23baa74f426988e41eeeb0f22dddb31f66947647f9d532d5da3c
                                    • Instruction Fuzzy Hash: 981144F3C15014AFF7208900EC0ABFB7268E714310F1849BAD90AD0984DBBC4FC5AA12
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 2b2dc7387bcdf4d43713a0a45ef1ab58c751d8c5d6521613cd854813b91b95f3
                                    • Instruction ID: 2caab3e23e82e0da75a81f5c65cf9e9d71d4cdf66e3ce7c88b6ad1f00541d44e
                                    • Opcode Fuzzy Hash: 2b2dc7387bcdf4d43713a0a45ef1ab58c751d8c5d6521613cd854813b91b95f3
                                    • Instruction Fuzzy Hash: 121182B3C005249FFB248A04DC4ABFB7768D714311F1441FAD90DA6684E5BD5EC19E91
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 671597b5841e1523677900ca648f68f3dce3c1f2a16d4d310ee05830db68df72
                                    • Instruction ID: 7fa68ca0481f30df6547ba4b349834fc8455d3098e8e61493c5c3ae6654c8a38
                                    • Opcode Fuzzy Hash: 671597b5841e1523677900ca648f68f3dce3c1f2a16d4d310ee05830db68df72
                                    • Instruction Fuzzy Hash: 671106B1E0835D6AF7208920DC41FF6B376F794751F2441F9EB09AA280E6792FC08A94
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: b6704b965f445e29587475ebe42281e65aaac405383068dc0c2dd2ce58e1a02a
                                    • Instruction ID: 4bb6bcf7944fdb4c58596f6b9e61751796b08821d56f21120e127e329e9b7b32
                                    • Opcode Fuzzy Hash: b6704b965f445e29587475ebe42281e65aaac405383068dc0c2dd2ce58e1a02a
                                    • Instruction Fuzzy Hash: 8401D6F1E4931C66F7208911DC01FF67276F790710F2481B9E709A95C4E2BD5B814995
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 8ebb7f44dc88f47b29242ba9c07b06a7087df78b28fd08135412bed4800c61aa
                                    • Instruction ID: 03b0d32143bd4f28f6450c4236e11cef2248aca618e70b400e7fd111d5709fb0
                                    • Opcode Fuzzy Hash: 8ebb7f44dc88f47b29242ba9c07b06a7087df78b28fd08135412bed4800c61aa
                                    • Instruction Fuzzy Hash: BC01D2F3C15014ABF7248900ED0ABFB7268E714314F1845BAE90AA5584DBBD4FC49A52
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: b3fd1f676b41be3c7fefdaab99349340e42fe0549185fb0b33c63de6c3970fd0
                                    • Instruction ID: 9e76405de74f2015289e99c6455f8fbbfdd2e09ad6b0192e182bd191f2e7b743
                                    • Opcode Fuzzy Hash: b3fd1f676b41be3c7fefdaab99349340e42fe0549185fb0b33c63de6c3970fd0
                                    • Instruction Fuzzy Hash: 321104B1E0835C6BF7308A20DC41FFAB376F784710F2442E9E709A5284E6792F808E94
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 895539d09c69e3d99d4039e310c8cda62506051b27437a81f0f61ad221e42880
                                    • Instruction ID: b69213993b306d412bcaeca0c0d917eb47b7983f7ccab70ff1c1ff39a6b4d3ab
                                    • Opcode Fuzzy Hash: 895539d09c69e3d99d4039e310c8cda62506051b27437a81f0f61ad221e42880
                                    • Instruction Fuzzy Hash: FC11A1F3C150159FF7208900EC4ABFB7268E754314F1444BAD90AA1684DABD4EC59A52
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 19d02807c26f27d9082fc2cf19c97259831d7769e88bf91d0daee58d33c2b969
                                    • Instruction ID: d6a6a1bdf2e74732671f6d9170a93abeb88e89f175e254cfb00d36f9147e676e
                                    • Opcode Fuzzy Hash: 19d02807c26f27d9082fc2cf19c97259831d7769e88bf91d0daee58d33c2b969
                                    • Instruction Fuzzy Hash: 020184F3C14158AFFB248A50DC56BF772A8D714310F1405B6E909E5280E6BD8FC49E52
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: adfda6d4ce1c955e57f23ead5956d21ae90f5e4a291a1af6df37077d0104c47f
                                    • Instruction ID: 14428cad4ab1f8e633aa5948f162ab809ef1ddad6e5407e1c35e2a9d60ba39f3
                                    • Opcode Fuzzy Hash: adfda6d4ce1c955e57f23ead5956d21ae90f5e4a291a1af6df37077d0104c47f
                                    • Instruction Fuzzy Hash: 0101F5B1E4831C6AF7208A20EC41FF6B276F750714F2441EAE70AA91C0E6795F805A95
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: bcbd25e33be6df7c240c6772f86f96a0e9d9afef977ae2b3194d36c4305a70b2
                                    • Instruction ID: 9fc60c11f3f740e7613e97e0134c792dab45b322f04096a7e0685ee7b7d42841
                                    • Opcode Fuzzy Hash: bcbd25e33be6df7c240c6772f86f96a0e9d9afef977ae2b3194d36c4305a70b2
                                    • Instruction Fuzzy Hash: 1301D2F3C04018AFF7208900EC0ABFB7268E754314F1444BAD94AA1680DABD4EC49A12
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: ad56a847cf1d184b0cc1197c6656717f9f5fa0db7cc025dfa61769f14cab1f55
                                    • Instruction ID: 118c09bf3f914eedf5b399d45a345a6a8f059622d5708c2b71d5fcf888efa238
                                    • Opcode Fuzzy Hash: ad56a847cf1d184b0cc1197c6656717f9f5fa0db7cc025dfa61769f14cab1f55
                                    • Instruction Fuzzy Hash: 0C016DB2C045149FFB248A04DC5ABFA77A8EB04321F1401FAD90E96680E9BD9AC1DE91
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: LM5I
                                    • API String ID: 823142352-636820872
                                    • Opcode ID: 8041f6fd757f819b02b9295a78ed3599f2050d8a86f546a68e0d34c4d1aeefde
                                    • Instruction ID: 43886836a9643b2948779ec6bb6459d448bbd503b4664b83a053bbd2bcf9255b
                                    • Opcode Fuzzy Hash: 8041f6fd757f819b02b9295a78ed3599f2050d8a86f546a68e0d34c4d1aeefde
                                    • Instruction Fuzzy Hash: B311F9709083585EE7294620DC65BEB7B38E742314F2106FAE69A690C2C6B81BC48B11
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000002,00000000,00000000,?,?), ref: 008FD695
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: jjjj
                                    • API String ID: 963392458-48926182
                                    • Opcode ID: 17eebd6ff0cc23bccf174c00acd3298e12e15a67c5097a27dd00a7016d4282da
                                    • Instruction ID: 99215666ae18e04bfadd44318cb20da4b824d0a0f68d089f5c1e042325dd8ab9
                                    • Opcode Fuzzy Hash: 17eebd6ff0cc23bccf174c00acd3298e12e15a67c5097a27dd00a7016d4282da
                                    • Instruction Fuzzy Hash: C501D2B0E4835C6BF7208A10DC41FFAB376F794700F2441E9A709A5680E6792F808E84
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 3a3b4d872d00907e024bfea48f28e23352baaa1bf3722df526724f65230a50d5
                                    • Instruction ID: b4d8109d2d3cd7dc7a0b3e4b8ff401fa1034b6d929dabdae5f1abba02d3dc81a
                                    • Opcode Fuzzy Hash: 3a3b4d872d00907e024bfea48f28e23352baaa1bf3722df526724f65230a50d5
                                    • Instruction Fuzzy Hash: 2701F1B3C114149BFB288A10DC1ABFA7368E714311F1441FEDA0A96A84D9BC4FC08E51
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: e409757587de11cc06cc3eb2245f3ae08f8f7438957788bce93b7c946f51ffdb
                                    • Instruction ID: d7d15f9e6c67cd714e96121e1f13e4f001c0991ec9638f8ed666763b845c513f
                                    • Opcode Fuzzy Hash: e409757587de11cc06cc3eb2245f3ae08f8f7438957788bce93b7c946f51ffdb
                                    • Instruction Fuzzy Hash: 6101F4F3818558AFF7208A10EC5ABF773A8EB18310F1804FA9949D5581DABD4FC4DE52
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 06870867217520493dd483d047cf1d903f39d1949e3e299f1fb5acbc8bb80cca
                                    • Instruction ID: d729f7d10c6c6d28bff816f22e088ae115e61f7344a7f84c5ff136496f6f155b
                                    • Opcode Fuzzy Hash: 06870867217520493dd483d047cf1d903f39d1949e3e299f1fb5acbc8bb80cca
                                    • Instruction Fuzzy Hash: 7F014FB3D005199FFB208A44DC4ABFA73A8E714311F1405F6D909E6280D6B95AC19E51
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: 7B3Y
                                    • API String ID: 544645111-3648703178
                                    • Opcode ID: 402b31f7f363f5216cc02f1bb72fd21bbf69a199207760692237c803016cef72
                                    • Instruction ID: 39c24c1019937b6ea7643b79ac288d22b60a49ec9098781e8e542d4fc01bf98a
                                    • Opcode Fuzzy Hash: 402b31f7f363f5216cc02f1bb72fd21bbf69a199207760692237c803016cef72
                                    • Instruction Fuzzy Hash: A5F0C2F2C94121AAF7105524EC89FFB766CEB04760F140076E90DE6140E27D8FC14AA6
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 7687824290d268f32db0b1a6aed371750a53d220b1dbf58684d34b246b07754a
                                    • Instruction ID: 1436172b259df1a5e49851e6e17ccb65fd1ee155e88ef2a09d2496e987304138
                                    • Opcode Fuzzy Hash: 7687824290d268f32db0b1a6aed371750a53d220b1dbf58684d34b246b07754a
                                    • Instruction Fuzzy Hash: B1016DB3C055299FFB248A00ED46BFA73A4E714311F2445E6D909E6684E6BD8FC0AE52
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 650e375969ee91eb7d61586d58c686ad4378dda41dd1c39cbc5344c100570039
                                    • Instruction ID: 8bee0a3fd28319b4ab04180bfb75ae7f9ee99d91b816c60e77d1e168f4eff2d0
                                    • Opcode Fuzzy Hash: 650e375969ee91eb7d61586d58c686ad4378dda41dd1c39cbc5344c100570039
                                    • Instruction Fuzzy Hash: D7016DB38045189BEB248A50DC56BFA73A8E714311F1405EAD909E6680DABC8FC09E51
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: e9d8f012683396562eba65902f3409bb8acdf4f3cab097b9e8b8d01ae3c5dad7
                                    • Instruction ID: dd4fc3c1183433b9d7462205e416501f6eb396482d5e58d1684fc32ab8c9124b
                                    • Opcode Fuzzy Hash: e9d8f012683396562eba65902f3409bb8acdf4f3cab097b9e8b8d01ae3c5dad7
                                    • Instruction Fuzzy Hash: 51F04FB3C055199FEB348A00DD4ABFA73B8E714311F1445EAD909E6684EAB84FC0DE51
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,000F003F,?), ref: 0092A26A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID: Ph?
                                    • API String ID: 71445658-2294233904
                                    • Opcode ID: 2b028382a26eb4ab443adde483ad036362c1bc18c5a20c2d182064a1b4ee5b53
                                    • Instruction ID: 3669d7bd6b9277ded61cf6c7d1fc4e6b0531f1ed4740f21666d90d036021935a
                                    • Opcode Fuzzy Hash: 2b028382a26eb4ab443adde483ad036362c1bc18c5a20c2d182064a1b4ee5b53
                                    • Instruction Fuzzy Hash: DEF030F3C144159BF7348A04DD4ABF673A8E714311F1405BA9909E5680EABD4FD49E92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: R
                                    • API String ID: 0-1968290334
                                    • Opcode ID: 41ea33fafc5a193e20359fbf685e9c7d015d36e54ecfdcec850efbe4f8625a11
                                    • Instruction ID: 240bccd4098e2fd52292a5174019d9256d8c79f4ebc000cd8a9332913878ab87
                                    • Opcode Fuzzy Hash: 41ea33fafc5a193e20359fbf685e9c7d015d36e54ecfdcec850efbe4f8625a11
                                    • Instruction Fuzzy Hash: DB7129E2D146249EF7244B24DC59BFB7B78EB90710F1441FED90E166C0E67D1EC18A62
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 94afcbb885cf53290e66505c55b729cd1521856f59a8a97a08a6583f317ab976
                                    • Instruction ID: 5da083a13cbec819ad66447ac4a4433cd97ef7fe8c929fb70d11da4aac454fbb
                                    • Opcode Fuzzy Hash: 94afcbb885cf53290e66505c55b729cd1521856f59a8a97a08a6583f317ab976
                                    • Instruction Fuzzy Hash: 6791D2B2D056288FE724CA18CD94EEABB7AEB94310F0481FAD80D67644D6396FC5CE51
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: e2b63121a7237b4f9da24cc850a1d108a15f5c9fb56ae945bc7815ed446ab38c
                                    • Instruction ID: 65cf96268e572bb7409c5ebc5cc562177afc48fbe857642326ece7a7f9e268d7
                                    • Opcode Fuzzy Hash: e2b63121a7237b4f9da24cc850a1d108a15f5c9fb56ae945bc7815ed446ab38c
                                    • Instruction Fuzzy Hash: 53A1CBB5E046788BEB24CB19EC84ADABBB5EF98310F1841EAD84DA3640D6355FC5CF41
                                    APIs
                                    • VirtualProtectEx.KERNELBASE(?,?,00001000,00000040,?), ref: 0090B3C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 7f632b43c2978e626a775be146d36414eb64096a4668847a9124ab2e56533294
                                    • Instruction ID: ce9afde25d2009dbb8158f2825b5d0bae9d08c99d69ad23c6fb8decf86bd58fa
                                    • Opcode Fuzzy Hash: 7f632b43c2978e626a775be146d36414eb64096a4668847a9124ab2e56533294
                                    • Instruction Fuzzy Hash: A37128B2D052248EF7248B14DC80BFA7778EF91310F1481FAE649566C2E67D5EC1CB62
                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,?,?,?,?,?,?,?,?,?,009086BE,?,009086BE), ref: 0092C4DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: e4fd2907da36f65f7a5c845060741da4704abea0f6c435ec56fc27d1b4932cad
                                    • Instruction ID: f33bffc9a7442867f1c8720e9daa3bc2bca2b1e8320c081f33f10da4ecd43386
                                    • Opcode Fuzzy Hash: e4fd2907da36f65f7a5c845060741da4704abea0f6c435ec56fc27d1b4932cad
                                    • Instruction Fuzzy Hash: C79190B1D092689FEB25CB18DC956EABBB5EF84310F0441EAE84DA2640D7785FC5CF42
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 69fabe70b1fd51af6b3deb31db2cea1ae100585615818b6fcfea11a3d86a283a
                                    • Instruction ID: 74472a5ec9c3fe4c55886525d6277c6099a2e3a899cf84f746c226c7d4f7be60
                                    • Opcode Fuzzy Hash: 69fabe70b1fd51af6b3deb31db2cea1ae100585615818b6fcfea11a3d86a283a
                                    • Instruction Fuzzy Hash: 8A81D071D045288FD724CB29CD80BEABBB5EFD4305F2481EAD40DAB294D6785BC6CE16
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 5914107311a3ac3ce1dab1553ddb14044e64c5ff14d232a04c9389f23df93f57
                                    • Instruction ID: 8479f4a34f8ff09878ed1a2bfe66a513c11e08f38d67b9d48148e74ce1b97fd0
                                    • Opcode Fuzzy Hash: 5914107311a3ac3ce1dab1553ddb14044e64c5ff14d232a04c9389f23df93f57
                                    • Instruction Fuzzy Hash: 2661F6B2D041349BE7248A54EC84BEBBB79EB85310F1541FAE90D23645D23D6FC5CE62
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 67560035323ca2dd15b8ef660c9d5badd7915aa4b9a78fd4e7ad4a1348b5cca7
                                    • Instruction ID: 4e9d929d57d2c360539a350864e47d43b5e18d14270b015e53c0d65a11b3e327
                                    • Opcode Fuzzy Hash: 67560035323ca2dd15b8ef660c9d5badd7915aa4b9a78fd4e7ad4a1348b5cca7
                                    • Instruction Fuzzy Hash: 5761D0B1D094359BF724CA54EC90BFBBBB9EF81311F1481FAC84DA2684D6385EC18E61
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 125a294ef5c36d7183e05301948edf83d0152bb5db3eb0dc3ddc0b2c46114312
                                    • Instruction ID: c16bb593d2f16e52be5c7704c5e3808d9f15d499d00b26ffcf88f28ee0d7595d
                                    • Opcode Fuzzy Hash: 125a294ef5c36d7183e05301948edf83d0152bb5db3eb0dc3ddc0b2c46114312
                                    • Instruction Fuzzy Hash: E35138B2D082645FE7208B21EC45BEB7B79EF82310F0481FAD44D56585D6785EC6CFA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31d8b3d8a8b7e05abb63f9e6c29597ee53dee3dba17a1561580634f674960650
                                    • Instruction ID: d18ce702a53eda61a6069c4b75b3b08d1d6f3711648e4112aebacbd0571ddf76
                                    • Opcode Fuzzy Hash: 31d8b3d8a8b7e05abb63f9e6c29597ee53dee3dba17a1561580634f674960650
                                    • Instruction Fuzzy Hash: CD51E2F2D15214AFF7288A10EC55BFA7769E780310F2081BAE60E966C4D77D5EC18A92
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 1481d6d2a0244f89ee74657369efe138f11a263d14944dd0cb98da27421ac2be
                                    • Instruction ID: a50c76762f6aac822ed07be30832b1c39b98683fef90fed26cbbe9433704c9a0
                                    • Opcode Fuzzy Hash: 1481d6d2a0244f89ee74657369efe138f11a263d14944dd0cb98da27421ac2be
                                    • Instruction Fuzzy Hash: A1513AF2D046389BE7248A54EC95AEBB778FB81310F1541FAE84D22641E2385FC5CE92
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,39335C83,?,00000000), ref: 0093AACA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: bb9757195bf4f8f7944c309c7ff9768c265f45819a14f02cc556601f1370058f
                                    • Instruction ID: 03239687189ddf71b45a9298800580ae094b7eaf595bd9d858222934b3dd572a
                                    • Opcode Fuzzy Hash: bb9757195bf4f8f7944c309c7ff9768c265f45819a14f02cc556601f1370058f
                                    • Instruction Fuzzy Hash: 8A51E472D055249FEB24CB14CCA0BFBBB76EF81312F1481E9D549A7281D6385EC1CE52
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: b188b488870be0d63c804a91aa24403ff496910c39b4714d1202630702dd8b41
                                    • Instruction ID: 5eb8a8448e9747efaf3da59d438536a3872c4ba8ef0fe848cc8911fc0669e231
                                    • Opcode Fuzzy Hash: b188b488870be0d63c804a91aa24403ff496910c39b4714d1202630702dd8b41
                                    • Instruction Fuzzy Hash: 085146F2D14514AEF7108A20ED49BFB7729EBC0310F1581BBE90D56680E27D5FC68E96
                                    APIs
                                    • VirtualProtectEx.KERNELBASE(?,?,00001000,00000040,?), ref: 0090B3C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 1dbea85e08f120facb33bb16fcfe2f847bf018053f274599ee80c0f4ae8a0320
                                    • Instruction ID: 6bccf77da6de0199ae34ed8ec511bb7b8b83efa4ffc3e999f941257a3e8dfbf2
                                    • Opcode Fuzzy Hash: 1dbea85e08f120facb33bb16fcfe2f847bf018053f274599ee80c0f4ae8a0320
                                    • Instruction Fuzzy Hash: 995111B19085548FEB248A14DCA1BFF77B9EF80305F2841FADA5E91281E73C6AC08E51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 5b9cef5876871ef860a7b9ddcd7ffc2314b146a0be43456346f0c17103360a35
                                    • Instruction ID: 4652117e78e9cc9174df9fd7aca45beb414f1d66f0228a25086f5055323ef6d2
                                    • Opcode Fuzzy Hash: 5b9cef5876871ef860a7b9ddcd7ffc2314b146a0be43456346f0c17103360a35
                                    • Instruction Fuzzy Hash: 9261C472D046288FD724CB29CD80BEABBB5EF84314F1481FAD40DA7294D6785BC5CE56
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: dace4513ce2d01881ee98a636057fc093739a387667d6c98dcb3984c1d210af4
                                    • Instruction ID: 354559b6e0ec4942fac12a682cf88070519995023233c89dc636c1a5bf674757
                                    • Opcode Fuzzy Hash: dace4513ce2d01881ee98a636057fc093739a387667d6c98dcb3984c1d210af4
                                    • Instruction Fuzzy Hash: 0451C272D046288FD724CB29CD84BEABBB5EF94304F1081EAD40DA7694D6785BC6CE15
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: c44a5d4f10f26ec8e72f5833469cc3b2d84adfb5e56cd85292d99afe3777968e
                                    • Instruction ID: 712dc68a1969bcd2a0c3b9d9b4921174b69998797709ff70c56a16a647395e35
                                    • Opcode Fuzzy Hash: c44a5d4f10f26ec8e72f5833469cc3b2d84adfb5e56cd85292d99afe3777968e
                                    • Instruction Fuzzy Hash: 5951E3B2D041249FE724CE18CD84BEABBB9EBD9304F1481FAD40D66644C27D5FCA8E56
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 3083e419c3d9e6480fd32b0993d170d550e93f6310235d0c32bb902dc2c603b4
                                    • Instruction ID: 99e7b545ccbaa957486604864e207e50a3fcec8a1cfa27bc5654eb7ca8e894d2
                                    • Opcode Fuzzy Hash: 3083e419c3d9e6480fd32b0993d170d550e93f6310235d0c32bb902dc2c603b4
                                    • Instruction Fuzzy Hash: 784157F3E845946AF3105625ECC8EEB7B39EBC1720F15817BEA4D06540E13D4EC78666
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: da95c60a2f2290913b44df64bc613ca7d4ad97c45158b969886f54cd6e6cea2a
                                    • Instruction ID: c673a14e60d30f536197763ee171bd0927492ceef5f25b48afc11c7c49e7b3f4
                                    • Opcode Fuzzy Hash: da95c60a2f2290913b44df64bc613ca7d4ad97c45158b969886f54cd6e6cea2a
                                    • Instruction Fuzzy Hash: 834126B2D05254AFF7248A20ED65BEB3B78EBC1314F2041FAE949662C1D6785FC1CE61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b0c964157a4bbe23cff09bc642527391c298c4e1ed3a9d9687d112ead79ebee1
                                    • Instruction ID: 0b6f59b6b6d3cfd861e1fbfe3200ae47590d169f594d32d849546e56cd24c172
                                    • Opcode Fuzzy Hash: b0c964157a4bbe23cff09bc642527391c298c4e1ed3a9d9687d112ead79ebee1
                                    • Instruction Fuzzy Hash: 8A41C5F2D81118AFF7208A15ED85FFB7739EB80720F1081BAE90D56680E57D5FC28A56
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: a1ffedfa88a64bb8f7f009315ef642e864b881b42f32b6fc3e272b0c1a8e0b62
                                    • Instruction ID: 8510f6737f21d201435da05b607a92284732eba51f39eaa5104f9459c9101aee
                                    • Opcode Fuzzy Hash: a1ffedfa88a64bb8f7f009315ef642e864b881b42f32b6fc3e272b0c1a8e0b62
                                    • Instruction Fuzzy Hash: F55149B2D046188FE718CF18DD85EEBBB78EB84305F1482FAE40D56244C2795FC68E56
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 12a11dc55488555c729821c51ab2ee1804d64fba4171177662ae8cdc4eabd4f4
                                    • Instruction ID: c203bbc0efdd1984f9f26eabe58be75318e14fa419cbd72ec030a76d32aedb17
                                    • Opcode Fuzzy Hash: 12a11dc55488555c729821c51ab2ee1804d64fba4171177662ae8cdc4eabd4f4
                                    • Instruction Fuzzy Hash: F04155F2D04164AFF3248620DC54BEB7B79EBC1320F1540BAE84966281D5795FC6CEA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 1dff4a8858965d962a7214038015fe3e452d0c84c234b5380a04a3415c05ee73
                                    • Instruction ID: 77ef6881700b987b81de9bf48cdf69f853f7c68a40219863844ae437f75d0b6a
                                    • Opcode Fuzzy Hash: 1dff4a8858965d962a7214038015fe3e452d0c84c234b5380a04a3415c05ee73
                                    • Instruction Fuzzy Hash: 3A51CF72D046288FDB24CB29CD84BEABBB5EF88304F1081EAD40DA7694D6785BC5CF55
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 23fa30e7450061f4ec11ec0109344f1777b0f1f36e043ac854ea365d7431bf63
                                    • Instruction ID: 416f9b16fd4591606ed9e0aeadc4c0bbe4eb0b0328ad1fe224c9d88d7f1bff51
                                    • Opcode Fuzzy Hash: 23fa30e7450061f4ec11ec0109344f1777b0f1f36e043ac854ea365d7431bf63
                                    • Instruction Fuzzy Hash: 26615B74D092A88BEB258B28DD557DABBF1AF89304F1482E9E84D62244DB715FC1CF01
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 0058eba37d5968374fdc1d88ca00b5d09873c1be7980bcdca6bee0019c9dba3c
                                    • Instruction ID: 692eba1e5a00c4cf165dea23e2ddde1c8e5c4c072f57eef996b93a0b7df04c0d
                                    • Opcode Fuzzy Hash: 0058eba37d5968374fdc1d88ca00b5d09873c1be7980bcdca6bee0019c9dba3c
                                    • Instruction Fuzzy Hash: B7415AB1D092B95ADB204B61DC447FABF79DF82310F1581F6D48DA6085D2784DC6CBA2
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,39335C83,?,00000000), ref: 0093AACA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 68ba2e1cc03c23ea0d85380a56166930d97824b6f58ffc12c77f336bd13fc2c8
                                    • Instruction ID: 0c25db6801f69fca43299601e574dd040bf04c801420d8fd84cfcae9c60fc012
                                    • Opcode Fuzzy Hash: 68ba2e1cc03c23ea0d85380a56166930d97824b6f58ffc12c77f336bd13fc2c8
                                    • Instruction Fuzzy Hash: ED519FB1D049688FEB24CF18CCA0BEABBB5EF45306F1441E9D949A7282D6359EC5CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: d703739dcc62d8a373c12cb740604d7b2ffe371f64ba0e38c6ccb2ff5b11d3e6
                                    • Instruction ID: a95f8b4f8273bcb9d2d181dd2978678393635b89f95089999ba4ef6c692bb06a
                                    • Opcode Fuzzy Hash: d703739dcc62d8a373c12cb740604d7b2ffe371f64ba0e38c6ccb2ff5b11d3e6
                                    • Instruction Fuzzy Hash: BA51A172D046288FDB24CB69CD84BEABBB5EF88304F1081EAD40DA7294D6785BC5CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 205441354c442d359b9ca109ecd276ea969f71895a9351bf16406c6415bfe714
                                    • Instruction ID: 46e0b00ebc6eb9bcb03271a8495a55bc968b0dcc0d981941ef5fd1a4ad505cfe
                                    • Opcode Fuzzy Hash: 205441354c442d359b9ca109ecd276ea969f71895a9351bf16406c6415bfe714
                                    • Instruction Fuzzy Hash: 3341D4F2D842186FF7208A15ECC9FEB7779EB80720F1081BAE90D66640D67D5EC28A51
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: fe2f2b333b14317d796991e5424d744c1d03e43c91866c4a65c8d091c5e6875c
                                    • Instruction ID: aa53cda9ceb571ee80f8be6ebc02d2f47c7e66558542d501c8ce2179d5b77dff
                                    • Opcode Fuzzy Hash: fe2f2b333b14317d796991e5424d744c1d03e43c91866c4a65c8d091c5e6875c
                                    • Instruction Fuzzy Hash: 1A41AFB2D54224DEEB248A14DD85BFB7378EB55310F1441BBD94DA6240E27C4EC28FAB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: edb8a330beaf055332ab78f71f60c65789ac4f712a73d27a4aed3777bd1578be
                                    • Instruction ID: 4e4a309c5ce51db968017e8e089abb99c591368a4bb74df793c89e05b6e2883e
                                    • Opcode Fuzzy Hash: edb8a330beaf055332ab78f71f60c65789ac4f712a73d27a4aed3777bd1578be
                                    • Instruction Fuzzy Hash: F841D1B1D086688BEB24CB14DC95AEAB779FF84304F1442FAD84D63245D6346FC2CE92
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: a3cc2aaf763d4fa07826c75cc463a09cc0218d72d990bbe6f8fbb05acaf1f9be
                                    • Instruction ID: a62097da08b6e7361b585f375041e556f7b3316dfd317eeced42ea4838bdbc1e
                                    • Opcode Fuzzy Hash: a3cc2aaf763d4fa07826c75cc463a09cc0218d72d990bbe6f8fbb05acaf1f9be
                                    • Instruction Fuzzy Hash: 0C41E3B2D085389BF7248690EC95BEBB7B8EB80311F1441FAE41E36644D6395FC58E62
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 791a6fd18d2050e85401f70a614c137e4bf74c762a86be795800a21359ee62b9
                                    • Instruction ID: 42b4e07890e1876f501973be77bdeba07e5ca1249d2f9470cd104bf9a81acdab
                                    • Opcode Fuzzy Hash: 791a6fd18d2050e85401f70a614c137e4bf74c762a86be795800a21359ee62b9
                                    • Instruction Fuzzy Hash: 353134B2D05194AFF7289A24DD69BEB3B38EBC1310F1101BAE449662C1C5795FC5CE62
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: b3aa9734bbf19bee1a8e4dc9e145389dabc12d23c09db066f6a0764569cebdb9
                                    • Instruction ID: a8702fcc58de0307d54453475fbd601509ef00ad087da92675b9fcc1f4cfbd5a
                                    • Opcode Fuzzy Hash: b3aa9734bbf19bee1a8e4dc9e145389dabc12d23c09db066f6a0764569cebdb9
                                    • Instruction Fuzzy Hash: BF3146B2D052A4AFE7249624CC65BEB3B78EBC1310F1501FAE8496A2C1C6795FC5CF61
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 99f78b2838dc24c1a6437147204bd087541be8bb370cfba4d857946196ebc2e9
                                    • Instruction ID: 7ed53395caa21f7b3c410da4e7945bcd8528c72d6928e0d30ed7d2bcbbb404b2
                                    • Opcode Fuzzy Hash: 99f78b2838dc24c1a6437147204bd087541be8bb370cfba4d857946196ebc2e9
                                    • Instruction Fuzzy Hash: DD31D4F2D54224DEF7108A14DC85BFB7268EB55315F1441B7DD4DA6280E23C8FC28AAB
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: c03982353d849f4d13dfe7243795b8810ad57a14e9c19c150b1504909e3416e3
                                    • Instruction ID: 63e734a770d13442acf5b90e8729e305554c4c5889bf1bbc50e466e158164a72
                                    • Opcode Fuzzy Hash: c03982353d849f4d13dfe7243795b8810ad57a14e9c19c150b1504909e3416e3
                                    • Instruction Fuzzy Hash: DD41C0B2D401259BE724CB14CD84BFA77B6EB84310F1481FAD90D97341D638AFC18E95
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 42178603d7ab2d1ac17919a4fd8b547041b49aa1440923dae2dcb41814d226a0
                                    • Instruction ID: 379b80cce18b20d83ed9f7f134e1b006fba0ca55d0a53782064a53204228eeb7
                                    • Opcode Fuzzy Hash: 42178603d7ab2d1ac17919a4fd8b547041b49aa1440923dae2dcb41814d226a0
                                    • Instruction Fuzzy Hash: EB3125B2D052A4AFE7249624CC55BEB3B78EBC1310F1501FAE8496A2C2C6795FC5CF61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c9177b0a9e938e3f35d58e8a43f7ee428a347faeff2f679e08fdff3d920d909
                                    • Instruction ID: ed459ac2efb8340fbef6705a84acdf7a3737987148267f2910b66830043680dc
                                    • Opcode Fuzzy Hash: 5c9177b0a9e938e3f35d58e8a43f7ee428a347faeff2f679e08fdff3d920d909
                                    • Instruction Fuzzy Hash: B641E471D094688FEB24CB14CDA0BBBBB76BF81302F1481EAD54DA7285D6385E81CF42
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 745722b8fa5c98059095b65e62d4944ee473dd45068db6f2ba47b941b8082dbd
                                    • Instruction ID: 2880966ec29546d3b15ebae206b231c09dfe695d7e0a72b5e0d401d5ae93144e
                                    • Opcode Fuzzy Hash: 745722b8fa5c98059095b65e62d4944ee473dd45068db6f2ba47b941b8082dbd
                                    • Instruction Fuzzy Hash: 8F31F7B2D085389BEB248690EC85BEBB7B8EB90311F1541FAE50E32644D63C5FC58E52
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 270623a6fffc7a5390213c2cf577ce37a0ac3c57082a4d28100a4a0a64223e4d
                                    • Instruction ID: 27b9315497d67c21ac6cbdb30c69bda87acd6ef53a1b774bc9ca31b08d0e4be9
                                    • Opcode Fuzzy Hash: 270623a6fffc7a5390213c2cf577ce37a0ac3c57082a4d28100a4a0a64223e4d
                                    • Instruction Fuzzy Hash: A331E6F2C54224DEFB108A24DC85BFB7378EB54315F1441B7DD4DA6280D23C4EC28AAA
                                    APIs
                                    • VirtualProtectEx.KERNELBASE(?,?,00001000,00000040,?), ref: 0090B3C8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: e8ae591026a63cb32db82e1f0e1bb3d8e74b7f49fa105618a1ab488529890076
                                    • Instruction ID: 2974446b82395150a449dcb46f64b9e061f3f4649de829216c64954b3efe7fb2
                                    • Opcode Fuzzy Hash: e8ae591026a63cb32db82e1f0e1bb3d8e74b7f49fa105618a1ab488529890076
                                    • Instruction Fuzzy Hash: 2C419CB2E055149FF728CA14DC90AFAB379EB80304F1481B9DA1E66381E779AE818E51
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: a67c4aaac8379c43ba13a82659dafb82c721bcd7db40b2decc114491c33c9208
                                    • Instruction ID: 0d84444a0eb1fcb588627ff14324ee1f27f7fd2fd102ef60acfa6e19a5ed166f
                                    • Opcode Fuzzy Hash: a67c4aaac8379c43ba13a82659dafb82c721bcd7db40b2decc114491c33c9208
                                    • Instruction Fuzzy Hash: 5531B4B2C042699BE7208A55EC89AE7BB78EB45320F0441F6D84DA6240D6385FC5CEA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 8b04ebbbf99e946f062d1021a27fceecf90a2f510773073852aaf20d9f76b600
                                    • Instruction ID: 4aa9dd345d65673ae35b8cab957c95532e7913973518a568fb6600fc6e3f9187
                                    • Opcode Fuzzy Hash: 8b04ebbbf99e946f062d1021a27fceecf90a2f510773073852aaf20d9f76b600
                                    • Instruction Fuzzy Hash: 2541E471D046148FD724CF28CD94B9ABBB5EF88304F1481EAD40C5B694C6795BCA8E46
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 5c08fd63016c21b054a6d4b97e32bd7cdb6e1055b874df71d07cfc2cdb0edb0c
                                    • Instruction ID: 9d5b88f1c960774d4efb7aa11a6dd023ade0870204a481e5dba98c68c14b446f
                                    • Opcode Fuzzy Hash: 5c08fd63016c21b054a6d4b97e32bd7cdb6e1055b874df71d07cfc2cdb0edb0c
                                    • Instruction Fuzzy Hash: 4F31B5F2D90218AFF7148A15EC85FFB7739EBC4710F1081BAE90D56640D57D5EC28A51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 4de23c624d467ee1e72b5406e7fee2f36504ba3b826bc5df1d6a478a068feeaa
                                    • Instruction ID: 0ea8a41090f7093469ba78b1b609d0c4b645b95e6f38507c236d0a0c4b183f9a
                                    • Opcode Fuzzy Hash: 4de23c624d467ee1e72b5406e7fee2f36504ba3b826bc5df1d6a478a068feeaa
                                    • Instruction Fuzzy Hash: B431E5F2E085189FF7288B10DC65BEBB778EB84710F1042FEE40E52680D67C5EC28A52
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 087af003d2c6aecd528f344c7898fca4f91eca59398a5df4cbe05b0923b8066a
                                    • Instruction ID: d09cf651d443cb215b716fd051fa4d1b5624b0e3c4e014868eb832b7ee8ef0fa
                                    • Opcode Fuzzy Hash: 087af003d2c6aecd528f344c7898fca4f91eca59398a5df4cbe05b0923b8066a
                                    • Instruction Fuzzy Hash: 8631F6F2D842586FF7208A15ECC5FEB7B39EBC0320F1481BAD94D5A240D57D5EC28A51
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 980d4f9c0594ec5e3625a330df5072e1a9a06ba0c54eef38a03e2065b36915d5
                                    • Instruction ID: 8c55034a8ab09df9a535024261e429aa3a91c72af2f14fb9f76b64f02996645f
                                    • Opcode Fuzzy Hash: 980d4f9c0594ec5e3625a330df5072e1a9a06ba0c54eef38a03e2065b36915d5
                                    • Instruction Fuzzy Hash: 4B31D1F3E15524ABF7248904DC44FE77678EB95320F0541B9E90EA6240D27D5FC58EE2
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 35d2be0f3afe690cfa87839833d3bc922edd977e0f108692452067e283ec207b
                                    • Instruction ID: 0b838ccd77e0b0a5d631d13cbfd4ab2f419020208865ba27e94db0c020a40d88
                                    • Opcode Fuzzy Hash: 35d2be0f3afe690cfa87839833d3bc922edd977e0f108692452067e283ec207b
                                    • Instruction Fuzzy Hash: 4031B6B2C08538DAEB248654EC49BEBB7B8EB84311F1541FAE40E32644D67D1FC58E52
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 96559d7694a33e1b7b4efc8e3965b644090e5ae2ca5c3619efd5ac7bbfda6c6e
                                    • Instruction ID: 116aae0212982470610d8f9ad3a36960232f92fc9faf5f3fb8aca13d1b4f2768
                                    • Opcode Fuzzy Hash: 96559d7694a33e1b7b4efc8e3965b644090e5ae2ca5c3619efd5ac7bbfda6c6e
                                    • Instruction Fuzzy Hash: 4F41B231D045288FDB24CE69CE44BEAFBB5EBC8305F1081EAD40D67258C7785BC98E45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 2fc0eeadff207568cca7dcb4fbcef6fe7664858f449bca4b767402626a16a58a
                                    • Instruction ID: c5c19074c1bc517cfb4e99979305f2d3fbb0855d6f43c8a964ed9ea0c0c518e7
                                    • Opcode Fuzzy Hash: 2fc0eeadff207568cca7dcb4fbcef6fe7664858f449bca4b767402626a16a58a
                                    • Instruction Fuzzy Hash: 2941C371D045688FDB24CF28CD54BDABBB6EB88305F1081EAD00D67258C6795BCACE06
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 7f9427ee2f33c5a440c246799a95018a16772016a72100cf7cb0a27e99c90fbd
                                    • Instruction ID: 9c1a9001044c622c2f847de708c3531db389a9513c7c57bf811be2ce39cb404e
                                    • Opcode Fuzzy Hash: 7f9427ee2f33c5a440c246799a95018a16772016a72100cf7cb0a27e99c90fbd
                                    • Instruction Fuzzy Hash: 9121E5F2C54224EEFB108A24DD89BFB7668E754311F2481BBED0D95180D27C8FC69E96
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: eaca00dad9ba84399146d56927ab985843105f9f20e434babf3ab1bae463e13b
                                    • Instruction ID: 787630a6ba4259c6403da4272c90618b296ca9eb70a4db4fd61ac04506f884da
                                    • Opcode Fuzzy Hash: eaca00dad9ba84399146d56927ab985843105f9f20e434babf3ab1bae463e13b
                                    • Instruction Fuzzy Hash: E3418371D045288FDB24CE69CE44BEABBB6EB88305F1482EAD00D67598C7785BC68E45
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 86e97e1faf6b00ca9278dd765ad78635d3628a71100cc6318bcc18d34d3f025b
                                    • Instruction ID: be66c48b443587916ed005937928d5abe58e2042da19c046050b0beb7e4afe9e
                                    • Opcode Fuzzy Hash: 86e97e1faf6b00ca9278dd765ad78635d3628a71100cc6318bcc18d34d3f025b
                                    • Instruction Fuzzy Hash: 1B2120B2C84229AFFB108A20DC94BFBB729FB84310F1441FAD80D67241D2385EC1CA99
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: f8c177bf0bc4a92a67295a7be0c612f450c36cbf2b02f4136c9e627815d3e7ea
                                    • Instruction ID: 170d6e925add39181b451bff31c36bb6feb967943693711c8479eb7de1c19891
                                    • Opcode Fuzzy Hash: f8c177bf0bc4a92a67295a7be0c612f450c36cbf2b02f4136c9e627815d3e7ea
                                    • Instruction Fuzzy Hash: D931A231E045288FDB24CF69CE44BEAFBB5EB88305F1482EAD00C66258C7785BC9CE55
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: b8791626b0082a9d7c61dbc4c56b5a3d76055929a220cb0c2aed3d2d602de655
                                    • Instruction ID: f48832b56edbd67bda688911a6fafdd5577ef626b60235d5dec7ba198ea9dbf0
                                    • Opcode Fuzzy Hash: b8791626b0082a9d7c61dbc4c56b5a3d76055929a220cb0c2aed3d2d602de655
                                    • Instruction Fuzzy Hash: 1131D472D045288FDB24CF18CE44BEABB75BB88309F1441EAD40CA7254C7B95FC98E46
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 5c77610562ae0228eae20f590a737f4dab55bc69e8762c6646d690f3f4b0f4ad
                                    • Instruction ID: 6f53da0b11d78231b6d6f4a5f951a4899369c68c80632bdeb73f74c5c298d02e
                                    • Opcode Fuzzy Hash: 5c77610562ae0228eae20f590a737f4dab55bc69e8762c6646d690f3f4b0f4ad
                                    • Instruction Fuzzy Hash: 1E21BFB2C54624AAFB208A20DC85BFB6668E750325F2441B7D94DA6180D67C8FC28E96
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 11cdda6e4f29b2329c5243d86f0fbf9f121a52922a52ba51477b7d2ce1393254
                                    • Instruction ID: 827c850f1017a255452258b0fc3d2e52645a2b91837b21c032494f3619b346df
                                    • Opcode Fuzzy Hash: 11cdda6e4f29b2329c5243d86f0fbf9f121a52922a52ba51477b7d2ce1393254
                                    • Instruction Fuzzy Hash: 4021D8B2D085389BE7248640EC44AEBB778FB84311F1541FAE80D36644D2795FC6CE52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 5ef102c5c952777ccb098b019105a12bab50ead88baa41ce315e2415d708a40c
                                    • Instruction ID: 92b99d2b75e2e9729a9042e883692676cac9cd2d6e4d126328261142e02c8880
                                    • Opcode Fuzzy Hash: 5ef102c5c952777ccb098b019105a12bab50ead88baa41ce315e2415d708a40c
                                    • Instruction Fuzzy Hash: D62103B1E45294AFEB214630CC65BEB7B38EBC1310F1501FAE589AA2C2C6781BC5CF11
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 80c91dc67fb32f82d433488fe960f91ee42225ba173d31f321c4fdf529d9f448
                                    • Instruction ID: b4a8a42af984394b528e29277132206578b59c34f1a163ca8424d3de88360327
                                    • Opcode Fuzzy Hash: 80c91dc67fb32f82d433488fe960f91ee42225ba173d31f321c4fdf529d9f448
                                    • Instruction Fuzzy Hash: C521DEB2D80229ABEB209620DC85BEB7739FB44310F1440FAD84DA7240E23C5FC18E95
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 071e0ba2a4330bd2670d94ce3b9d03382c8e291beb9aeb1e2be9e84d50fdc96e
                                    • Instruction ID: 94de8ce1f6785a757ad520ebb71ae5e2b3b4c9daba98f043d4c5974b89478e6e
                                    • Opcode Fuzzy Hash: 071e0ba2a4330bd2670d94ce3b9d03382c8e291beb9aeb1e2be9e84d50fdc96e
                                    • Instruction Fuzzy Hash: EE21C6B2C195389BEB248A80EC85BEBB778EB84311F1541FAE80D72644D27C5FC5CE52
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 852bc356184da13c937408f6a3ec90cd80aea761ced9d1a8c3236ac17325f98e
                                    • Instruction ID: 1046db2b5b148e29e0bb559a1ae562939e5f6800a1f5e706a16ebf03f763723b
                                    • Opcode Fuzzy Hash: 852bc356184da13c937408f6a3ec90cd80aea761ced9d1a8c3236ac17325f98e
                                    • Instruction Fuzzy Hash: FB21D6B2D085399BF7208654DC95AE7BB74EF41311F1541F6D84DA2280D6785EC1CEA2
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 6526f16f95859e7ee94ae9c2885e2aff3aa3018455aa0a90f80b138e3c0bbc60
                                    • Instruction ID: 7bf2301a5416a7596ea587627c2c52d3340fec3f0a99fa5901fd43707f75ab9c
                                    • Opcode Fuzzy Hash: 6526f16f95859e7ee94ae9c2885e2aff3aa3018455aa0a90f80b138e3c0bbc60
                                    • Instruction Fuzzy Hash: 2221C9B2C04638DBE7248A80EC44AEBB778FB94311F1541FAE80D72644D2385FC5CE52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 473f7ef9b01ce703fd949d31cbb76ee2ff466edff89be1e8deba3a1158114838
                                    • Instruction ID: fba609756d92b96f84fe6b3dd7903e6df41745425c2ecb5c1cfbed15700b45d1
                                    • Opcode Fuzzy Hash: 473f7ef9b01ce703fd949d31cbb76ee2ff466edff89be1e8deba3a1158114838
                                    • Instruction Fuzzy Hash: 012126B1D05294AFE7259620CC61BEB7B78EBC1310F2541FAE589A62C2C6781FC5CF11
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: ee5390707d3518ed124f7087bff1e3fb683fff2fc0e2d3a99e434ef75eec7224
                                    • Instruction ID: bfa5423817708da8e6adb62a7d78cc60ead980c0b4f204180f98f16a718dc0b4
                                    • Opcode Fuzzy Hash: ee5390707d3518ed124f7087bff1e3fb683fff2fc0e2d3a99e434ef75eec7224
                                    • Instruction Fuzzy Hash: 1921A4B2C045389BEB248A80EC45BEBB778EB84311F1541FAE90D72644D27C5FC58E52
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: d9190cba3ba96e9024bedc3ff984d03ec3cb6d846a86afd16c8923b5393415c5
                                    • Instruction ID: e796e3641309ace17e22620f2fb77ada081cabcaefda014d84c6f66ab8e6fefa
                                    • Opcode Fuzzy Hash: d9190cba3ba96e9024bedc3ff984d03ec3cb6d846a86afd16c8923b5393415c5
                                    • Instruction Fuzzy Hash: 112196B2C055389BEB248A80EC45BEBB778EB84311F1541FAE90D76644D2785FC5CE62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 49954132de3c07094ee499b7b3437e0d74b86a06f7189128f23b4220989fc526
                                    • Instruction ID: 58cbb210449243d3ad46e30b7af81cf0905a9e6f15068d571d836ac8cde04e56
                                    • Opcode Fuzzy Hash: 49954132de3c07094ee499b7b3437e0d74b86a06f7189128f23b4220989fc526
                                    • Instruction Fuzzy Hash: 0431B271D045688FCB28CF68CE94BDAFBB6AB88305F1081EAD00C67558C7785BC9CE46
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 426436f8db68228f40b69dd4ed3219267f6325ff45afaec00a4bc56e3ba3804b
                                    • Instruction ID: f6e14e4987c1413c5216fc5b1eaa62636d48edc2e5fec05411432372a295f57d
                                    • Opcode Fuzzy Hash: 426436f8db68228f40b69dd4ed3219267f6325ff45afaec00a4bc56e3ba3804b
                                    • Instruction Fuzzy Hash: 862135B3E044059FF7248614DC14BFBB778EBC4315F1582FAE54E86281C67D9AC48E91
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: e5a33aefab0d4a658201acb92a5da6016c11bbb5b3e8883c2c6556af6a16f349
                                    • Instruction ID: b3ec0fa55708011be8ab682fb5598677abf9f677e3d31b49d892cd183e820624
                                    • Opcode Fuzzy Hash: e5a33aefab0d4a658201acb92a5da6016c11bbb5b3e8883c2c6556af6a16f349
                                    • Instruction Fuzzy Hash: 8C31C472D045288FDB28CE18CE54BEAFB79BB88309F1442EAD40D67254C7795BC98E46
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 286435bbb50076fb906b22fd5c791587cae8490bb97f698facd0da2f981f0ef6
                                    • Instruction ID: cc5b30f8266f9c4c75c8044de131a16ecd35cbd5d521b99397512d0831276d45
                                    • Opcode Fuzzy Hash: 286435bbb50076fb906b22fd5c791587cae8490bb97f698facd0da2f981f0ef6
                                    • Instruction Fuzzy Hash: 6C11E971E083686EF7258620DC65BEB7B78E782314F1111FAE559651C1C2BC1BC5CA12
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: e30166cbfb847f33f10dc9a0d1f5e295825716b22ecda471e2197bcf92a4bf90
                                    • Instruction ID: 4456b26a69a6c52f1ec4d6e0db6c1e0fc45ea5cb9c35b928fd684528567772b4
                                    • Opcode Fuzzy Hash: e30166cbfb847f33f10dc9a0d1f5e295825716b22ecda471e2197bcf92a4bf90
                                    • Instruction Fuzzy Hash: C511EBB2C0563C5BEB248A90DC85AEBB778EF44311F0042FAE54D62640D2785FC6CEA1
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: fffd537b50bc22be30234d3c1970548c3f62d62aaec4d30157c9f07abb9480d9
                                    • Instruction ID: 21bb769881fb6d545dc4e2cf582016435fe674fe5678618669afce9e50332be4
                                    • Opcode Fuzzy Hash: fffd537b50bc22be30234d3c1970548c3f62d62aaec4d30157c9f07abb9480d9
                                    • Instruction Fuzzy Hash: 73316F75D05A288FDB28CF18CE94AEABB79FB98305F1081E9D40C67254C7796BC5CE44
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 259de0db5b6fd6bd7cc189d2b32fb75b7f2b3471ca6239219715c73f6aafa49d
                                    • Instruction ID: 5af42319bfea09a23fe02515ddb0c1a57fc9b2e7178c853a166a89f33ffe5cbe
                                    • Opcode Fuzzy Hash: 259de0db5b6fd6bd7cc189d2b32fb75b7f2b3471ca6239219715c73f6aafa49d
                                    • Instruction Fuzzy Hash: FF1129F2C98614AEF7104620DD89BFB722CE754325F2441B7ED0D96180D27C5FC65A9A
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 588f086301bc42b8613a801edaf6268299a3d9738604243ab604a9157250af10
                                    • Instruction ID: 49c510807b60eb2822e07266f43ee40d336899d8b8ba5be9ce473cffbd7d8c6d
                                    • Opcode Fuzzy Hash: 588f086301bc42b8613a801edaf6268299a3d9738604243ab604a9157250af10
                                    • Instruction Fuzzy Hash: 4D319435D086648FCB28CF28CE98BD9BB75AB88305F1542EAD00D67194C7795BC9CE45
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 63aef3c27a6dcbbef21aa139902d1aeeef29c91b371723a8dea3f3a828165de4
                                    • Instruction ID: d1146e0852971d154727119566392c91db69529ef9053fd9789abc78be3655d5
                                    • Opcode Fuzzy Hash: 63aef3c27a6dcbbef21aa139902d1aeeef29c91b371723a8dea3f3a828165de4
                                    • Instruction Fuzzy Hash: E3318172D045288FDB28CF1CCE94BDABB75AB88309F1441EAD40DA7254C7B95BC98E45
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 294e74a8505973351756a1cf8f0102c9b1fa671fdd0dc04da5d69149d6855ac7
                                    • Instruction ID: a61e6d4fd04fe31d042face194e64108c7d3c4e342fdc72f4b80ddfec132761e
                                    • Opcode Fuzzy Hash: 294e74a8505973351756a1cf8f0102c9b1fa671fdd0dc04da5d69149d6855ac7
                                    • Instruction Fuzzy Hash: 491104B19052986FF7228720CD25FFB3B39EBC1310F1042E9E588A61C6C2741BC68F61
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 7eb476148465c7f3ea511d81fd962fc0e80fcbef7f934ff6cb3c3b581005804a
                                    • Instruction ID: e9aebea329d254fa759e718e60c36321ffbd07d327fef8a73990c93ef7414f3f
                                    • Opcode Fuzzy Hash: 7eb476148465c7f3ea511d81fd962fc0e80fcbef7f934ff6cb3c3b581005804a
                                    • Instruction Fuzzy Hash: B51129B2C046389BE7248690EC54AEBBB78EF44310F0541FAE84D62644D2395FC5CE52
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 1a140839b2206c035e0c9caff8f865aeb95db792c3a4da02e0c9616e15febd99
                                    • Instruction ID: 05649ab263e6e927e73eec75f55cdade34765d7516b142371889ee9e572bca1a
                                    • Opcode Fuzzy Hash: 1a140839b2206c035e0c9caff8f865aeb95db792c3a4da02e0c9616e15febd99
                                    • Instruction Fuzzy Hash: D4318271D045288FDB28CE2DCE44ADAFBB5EB88305F1481EAD00D67658C7795BC9CE45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 3a7094f511edf89e9aa52eec18bc2f961a147243dd10debba773007dac8d76dc
                                    • Instruction ID: bb2de6384edd7aaabd5fdebe02834e0c0a89a13548baae09fd62d70027b969ae
                                    • Opcode Fuzzy Hash: 3a7094f511edf89e9aa52eec18bc2f961a147243dd10debba773007dac8d76dc
                                    • Instruction Fuzzy Hash: C61104B2C056A85FE7204651DC45BD67B79DF81310F0541F2C84C66195C1786ECACFA2
                                    APIs
                                    • ExitProcess.KERNEL32(D7402EF8), ref: 0041EB1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 3e1768d45e2e46194e9bf9f9893c900781775049a40accb1a001e2b2b6d744bb
                                    • Instruction ID: d8a2eff88b74671ee8be78405892aa35910b2fa02a1bec7ebbd6c9c57302a9eb
                                    • Opcode Fuzzy Hash: 3e1768d45e2e46194e9bf9f9893c900781775049a40accb1a001e2b2b6d744bb
                                    • Instruction Fuzzy Hash: E121C275E041598FEB24CB65DCD46EEBB70BF85345F2441EAC86917281C2381AC5CE05
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,39335C83,?,00000000), ref: 0093AACA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: f7031d6038f35a0e0f63b90f1021d9fd54d0399181d4eacf800700310aed3e30
                                    • Instruction ID: ba7293e5bf6bccf3fa162657f8e1ce5389fff9d85a8616ede66241b9f3dedd52
                                    • Opcode Fuzzy Hash: f7031d6038f35a0e0f63b90f1021d9fd54d0399181d4eacf800700310aed3e30
                                    • Instruction Fuzzy Hash: 7E11D3B2C055189FEB20CA14CD91BABBBB5EF40312F1482EAE84997281D6395E94CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: abb34a87a6320760f8e9ef98ff727c522c87b87e0c34628d138609342a3b6fed
                                    • Instruction ID: 5e8c441cd927250b997cbc26daecc74f2bdc414965abeabe14c8a9b6f9bbd0d7
                                    • Opcode Fuzzy Hash: abb34a87a6320760f8e9ef98ff727c522c87b87e0c34628d138609342a3b6fed
                                    • Instruction Fuzzy Hash: 3011E7B1D056986FDB219B20CC61BEB7B34ABC1310F1105EBD589A62C2C6741FC5CF10
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 5084487c1bea1109eec6d5f5d9948dedc8079a88211566eef2eed86633aabf16
                                    • Instruction ID: d6d5769e93a8c9cd52ac2ad9dcde85ad284d2dac803e3b132b7bcc7469727fb3
                                    • Opcode Fuzzy Hash: 5084487c1bea1109eec6d5f5d9948dedc8079a88211566eef2eed86633aabf16
                                    • Instruction Fuzzy Hash: B3217171D045288FDB28CF18CE84BDAFBB5AB88309F1581EAD00D67258C7B95BC98E45
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 83e2e4ad383e4afa489dfc4e2cb96589c3001f722bd055590bf81d01202b4cc5
                                    • Instruction ID: a850253ff0dbd4349ebab1a360f3da01b656d18c2b1874bc2c1f28f3f955c30a
                                    • Opcode Fuzzy Hash: 83e2e4ad383e4afa489dfc4e2cb96589c3001f722bd055590bf81d01202b4cc5
                                    • Instruction Fuzzy Hash: FB112BF2848250AEF7108620DC9ABFB7778EB50315F2440BBD94D99081C67C4FC68F5A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 891ffd35cbd1485c54bc83f321f0162f0fc186c21752f18b14b2e8d0fa493192
                                    • Instruction ID: 3df1c509c31ec81d2112117b3ca52857f24f415221e4ec6a9613de45587494e5
                                    • Opcode Fuzzy Hash: 891ffd35cbd1485c54bc83f321f0162f0fc186c21752f18b14b2e8d0fa493192
                                    • Instruction Fuzzy Hash: 09014CF2904405ABF7188604DC55BFB73A8EB95312F0046FEE60A96180D6BD5EC48ED2
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: ae63c5e048257067f3039b6b756ea3c59987e09f916fa158ceb6cb2ecfc5f1ac
                                    • Instruction ID: e858660d510e690c2047beaeef7fdd18c3cd5906502f33c8ff84e4139ec550f7
                                    • Opcode Fuzzy Hash: ae63c5e048257067f3039b6b756ea3c59987e09f916fa158ceb6cb2ecfc5f1ac
                                    • Instruction Fuzzy Hash: C711ECB2C94218AEE7108A24EDC8BEF7679FB44714F1081B6E909A1580C63D8FC59B45
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 5d06fe31072f73db7e5db8156dcd5d6a683aef41863dccfe8814adc02f562b47
                                    • Instruction ID: 8c6524c0a6b907e5bf9f1507986ee31cd24442be3ee6fb2aa89a94f501fa2c04
                                    • Opcode Fuzzy Hash: 5d06fe31072f73db7e5db8156dcd5d6a683aef41863dccfe8814adc02f562b47
                                    • Instruction Fuzzy Hash: 7D11ECB2C94219AEEB108A20DD88BEB7B79FB48310F1081B6D808A6584D63D8FC58B45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 6432c8318c6c31d735ccae393ef13977569b52f5fd1d5cea3a4b4cf10df1951f
                                    • Instruction ID: 1bcf85ec8df39aaa9a0a448d3211382a68b842d50b5be1551cd48ad92ed1deea
                                    • Opcode Fuzzy Hash: 6432c8318c6c31d735ccae393ef13977569b52f5fd1d5cea3a4b4cf10df1951f
                                    • Instruction Fuzzy Hash: 861108B2D046785BF7204A52DC49BD7BB799F90320F0581F6D80C22544C6B86ECACEA2
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: b045d057c2fc95598acea5fd6ce7c7dacc7c5efa29f601d2f1507b584ecb0121
                                    • Instruction ID: 041f0431940336af92682a8c3994b40da77e0f904aa08eb69281adc0bea31f91
                                    • Opcode Fuzzy Hash: b045d057c2fc95598acea5fd6ce7c7dacc7c5efa29f601d2f1507b584ecb0121
                                    • Instruction Fuzzy Hash: A40184B3D046786AF7204A52EC49BD77B69DB50321F0545B6D80D62284C1BD6FCA8EA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: bbe8450253977bca0c062904586e0d32b2b2549ffbc811a1b10c1af19117d04b
                                    • Instruction ID: 3f4a251f04576606060229a3c62f2168808393bf79350f2e6ee5f67a1a7b0228
                                    • Opcode Fuzzy Hash: bbe8450253977bca0c062904586e0d32b2b2549ffbc811a1b10c1af19117d04b
                                    • Instruction Fuzzy Hash: A511E9B2C056789BE7208A52DC897D67B789F40311F0641F6D40C26145D2BD6ACACF92
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 1d8ff8e38f1ca72b150a6505b033f3631655489fae71bf2ab9a7ce8e8300d3cd
                                    • Instruction ID: 2f4d0cbef272dc60df17bd749d2c57412aa16e5f81255034a27b0549e83c7d43
                                    • Opcode Fuzzy Hash: 1d8ff8e38f1ca72b150a6505b033f3631655489fae71bf2ab9a7ce8e8300d3cd
                                    • Instruction Fuzzy Hash: D201B5F2A45005AFE7288504DC55FFBB36CEB84311F0442BDE90A96240D6796EC48E92
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 16e25ef2f5c207c25ebcb1c6859400c07d849e0ef597ca9e94788e442c49c3f7
                                    • Instruction ID: 1c36b401c951dc3e23cd11d60758ee6411a8f8dca43621f9a16ef411bebbc5d0
                                    • Opcode Fuzzy Hash: 16e25ef2f5c207c25ebcb1c6859400c07d849e0ef597ca9e94788e442c49c3f7
                                    • Instruction Fuzzy Hash: B1215175D046288FCB28CF18CE84AE9FB75EB88305F1481E9D00DA7254C7755BC5CE45
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: f26637d0e53abb5c6a72f9583c64871bb17940e0889995a4a49f46e5f35177b0
                                    • Instruction ID: e540570a596facb682a20bfe8a4d952c44d9e887c8b0d419202479587711249e
                                    • Opcode Fuzzy Hash: f26637d0e53abb5c6a72f9583c64871bb17940e0889995a4a49f46e5f35177b0
                                    • Instruction Fuzzy Hash: 6B11F970D0C3549EE7294620DD66BF77B38E742314F1146FBE65A650C1C6B81BD48B12
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 0e64c9a066431770c1e538538201def131590c881ba035a83644e2ce619d83c8
                                    • Instruction ID: 3c08126114716a5acf8ca33620c6244e47f58411966e7fccbcd5d8b421e3173d
                                    • Opcode Fuzzy Hash: 0e64c9a066431770c1e538538201def131590c881ba035a83644e2ce619d83c8
                                    • Instruction Fuzzy Hash: 9001B5719083A8AEE7254630DCA5BE77A38E742714F1102FBE699650C2C2B91BC4CB12
                                    APIs
                                    • ExitProcess.KERNEL32(D7402EF8), ref: 0041EB1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 284590203c9d4f6344e038b83bb4d3846814b2dd1e6acbd3fb5fb093bbdfbc72
                                    • Instruction ID: 0ece2404e48273a56849b7ff2f4b1e463a8c4d99babb6272a85de91f86cbe634
                                    • Opcode Fuzzy Hash: 284590203c9d4f6344e038b83bb4d3846814b2dd1e6acbd3fb5fb093bbdfbc72
                                    • Instruction Fuzzy Hash: 0A1125B6E041589EF724C662DCD86EF7774FF84315F2441FBC85912281C2382EC18E06
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 3a7fe09157d59cbe24c9704b448c8dc8aceb320caa815f45c81c60bafdeb5ce1
                                    • Instruction ID: 46d9cf220f16f173843230f45db5d11c70def3786b9a7f606824bfbd3770f1c0
                                    • Opcode Fuzzy Hash: 3a7fe09157d59cbe24c9704b448c8dc8aceb320caa815f45c81c60bafdeb5ce1
                                    • Instruction Fuzzy Hash: 0901B9B2D046785BE7304A42DC49BD7BB799F50321F0581F6D80C22244D2BD2FCACEA2
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 72e2da79b3d842b9e8d3967fa43727c636bbf3f067c7f81f9bf641e89d1818a8
                                    • Instruction ID: 42bd1598685f2c8bfe81438ebd909425a1e77f021a838633762f4e317ca459f4
                                    • Opcode Fuzzy Hash: 72e2da79b3d842b9e8d3967fa43727c636bbf3f067c7f81f9bf641e89d1818a8
                                    • Instruction Fuzzy Hash: A30175B2D056785BF7304A52DC49BD7BA799B50321F0641F6D84D22184D2BD2ECACEA2
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: e6c544a69d2f7ed5de0680eb67c04cae5e6c445befbcf0c8994afd5a68814ab7
                                    • Instruction ID: 102379f3035811a6756246d7f6391455c2bf76d8c1dc0ab62493bf3e046c72f9
                                    • Opcode Fuzzy Hash: e6c544a69d2f7ed5de0680eb67c04cae5e6c445befbcf0c8994afd5a68814ab7
                                    • Instruction Fuzzy Hash: 67213C35905A298FCB28DF18CE84AE9FBB5AB88309F1482DAD00D67258C3755BC9CE45
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 0c74814c970419d156efc63e33d7b344ec1c4089b94414aaddd3c884600bd64f
                                    • Instruction ID: 002924edb34e52c9dab2aec6c4ffb8fac8ca7b952bfafdbc8fd8adddb1d7976c
                                    • Opcode Fuzzy Hash: 0c74814c970419d156efc63e33d7b344ec1c4089b94414aaddd3c884600bd64f
                                    • Instruction Fuzzy Hash: CC213E35905A698FCB28DF18CE84AD9FBB5AB8C309F1485DAD00DA7254C3755BC4CF45
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 05f1f2fa0499858905858a0dd537e5be070f9e021ade29bd6cfe6b78e001970e
                                    • Instruction ID: 130b5d472fde69285e2727f2d63a57f746d3093453fdec85d424b2d563f4634f
                                    • Opcode Fuzzy Hash: 05f1f2fa0499858905858a0dd537e5be070f9e021ade29bd6cfe6b78e001970e
                                    • Instruction Fuzzy Hash: 97211D35D05A298FCB28DF18CE84AA9FBB5EB8830AF1482DA900D67258C7755BC5CE45
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: a95b43a8b28202706e2d5482095ed353b03a61a8c607c4b6129fdc3137bea5d6
                                    • Instruction ID: 19895ded6bd71eff3b2970273aaf801949e0c8001bcf1f35fc41f42fb46c1122
                                    • Opcode Fuzzy Hash: a95b43a8b28202706e2d5482095ed353b03a61a8c607c4b6129fdc3137bea5d6
                                    • Instruction Fuzzy Hash: 7901D8B2E443946FFB218630DD25BE77B39ABD1310F1502EAE548A61C3C2B94B858F15
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,39335C83,?,00000000), ref: 0093AACA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 2833f676f110f3bf7f383ea34c08a2f7570ad2e212116b6a2f8b14ddbc6fbdca
                                    • Instruction ID: ee3297bdfe996d111cb1017c7334c8e0e0c1af04fdd3c37a79ea258932a6a31c
                                    • Opcode Fuzzy Hash: 2833f676f110f3bf7f383ea34c08a2f7570ad2e212116b6a2f8b14ddbc6fbdca
                                    • Instruction Fuzzy Hash: 1201B5B2C055189AFB20CA05DE80BBBB775EB40311F1081FAE80D96240E6391E94CE52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: e665449f3481df5b4cabe8df88a87caa9c2090206978756f400df04b9234ae23
                                    • Instruction ID: b0058c95bf48232a3ffb62530c5bd3f0ee4d5fc4103536ddc211a8950cd49441
                                    • Opcode Fuzzy Hash: e665449f3481df5b4cabe8df88a87caa9c2090206978756f400df04b9234ae23
                                    • Instruction Fuzzy Hash: 5501D4709463946FDB269B308D61BEA7B34AB82710F1501DAD584AA2D3C6705F85CF10
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 12837074adf44fb41b341c8af6b05101f35c149c12e54fa078bab54908b02e58
                                    • Instruction ID: fd01c687d2eb289cdd0abbbc3f1bc05a0c3dd0f4319cae37e76a57b1434755dc
                                    • Opcode Fuzzy Hash: 12837074adf44fb41b341c8af6b05101f35c149c12e54fa078bab54908b02e58
                                    • Instruction Fuzzy Hash: 76210C759056298FCB28CF18CE94A99FBB5BB88309F1481D9D40DA7258C7756BC4CE44
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: b028ff3682295579ce617f9272c86a63c133fe1d8cbe995d194579a2eebeb533
                                    • Instruction ID: eea5299ed971ea09eff50258f026aa3402185aa44c9a2192588ec00cf1afd48b
                                    • Opcode Fuzzy Hash: b028ff3682295579ce617f9272c86a63c133fe1d8cbe995d194579a2eebeb533
                                    • Instruction Fuzzy Hash: 6F01A2B1C096789BE7348B51AC45AD7BB78DB44311F0142FAD44D62240D6781FC6CEA1
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 2c6c0187c35e8d956e9bcbb30284187eaca78b0c004bf18b294f518cf0b1f9c6
                                    • Instruction ID: 3b1e0f745da4719362c2c379179668cf994aa8ef91b10971c66ddbafe8a69dba
                                    • Opcode Fuzzy Hash: 2c6c0187c35e8d956e9bcbb30284187eaca78b0c004bf18b294f518cf0b1f9c6
                                    • Instruction Fuzzy Hash: E501D4B19443986FEB614630DCA1BE73B38DB81314F0405EAE544E52C2C2755BD08F61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: d464a7c766b595da835da45c709fd0e4f31d3a28975c46660ec67d15306194af
                                    • Instruction ID: 78e80610f948111eca96823b932c94fa5f327cd7b0cac9d21f2d6ca7f7dbb13d
                                    • Opcode Fuzzy Hash: d464a7c766b595da835da45c709fd0e4f31d3a28975c46660ec67d15306194af
                                    • Instruction Fuzzy Hash: E301F9F3D126109FF7244A60DC91BFB766CDBC0315F1844B9A60E551C2E67E5AC08A51
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 7b37c2306635ce479f0258e8ec98b0f4f5cb4abee1fb6af909992396b93dc901
                                    • Instruction ID: b884804259e124b0de48f1445b5f5848933518517e0bf29dc385ab4250d7d561
                                    • Opcode Fuzzy Hash: 7b37c2306635ce479f0258e8ec98b0f4f5cb4abee1fb6af909992396b93dc901
                                    • Instruction Fuzzy Hash: BB214F35904A298FCB28CF5CCE94A99FBB5FB8830AF1482D9D00D67254C7B56BC88E44
                                    APIs
                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 009368AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 4faf9b94901eb3323e9efb52101748d508f2feaff0950fb1bc8a5752ad186c40
                                    • Instruction ID: abb6d209eb5792968dbdf0293121c1644d2f14e650eb3c955505b1382a1fe440
                                    • Opcode Fuzzy Hash: 4faf9b94901eb3323e9efb52101748d508f2feaff0950fb1bc8a5752ad186c40
                                    • Instruction Fuzzy Hash: D001A9F2A444159BE728C504DC15FF773ACEB94315F0442FEEA0A96140D6795ED48E92
                                    APIs
                                    • K32GetPerformanceInfo.KERNEL32(?,00000038), ref: 004158CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: InfoPerformance
                                    • String ID:
                                    • API String ID: 3070290716-0
                                    • Opcode ID: 66bb73d4853e0cfd11bce03c0ae37fa927d1758748597fe9739d080facadaf77
                                    • Instruction ID: 15dc8cf2646a8b9a46b8774527ca9ffc6126ee3136000852301462eda88ddf43
                                    • Opcode Fuzzy Hash: 66bb73d4853e0cfd11bce03c0ae37fa927d1758748597fe9739d080facadaf77
                                    • Instruction Fuzzy Hash: 972130359045288FCB28CF18CE94A99FBB5BB88309F1481D9D00D67254C7B55BC98E44
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 1adeff401dfe2875c3e45ddba2f15ce09b0cb21beac3a508f0d0bf5acf32cd45
                                    • Instruction ID: c7f05a4fff7ce5bcc97bdc301b250e6fc816e5ea09f60fc95014a851955d5812
                                    • Opcode Fuzzy Hash: 1adeff401dfe2875c3e45ddba2f15ce09b0cb21beac3a508f0d0bf5acf32cd45
                                    • Instruction Fuzzy Hash: D20186B1C096389BE7348B41EC499D7BB78DB44311F0141FAD40D62240D6791FC6CEA2
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: ae852570922ff721b190a9f4d5fbc998a96d6e43aba75d04e3a8d6f81e76ea1e
                                    • Instruction ID: fcbee8f969cc79ab8cf74a489b33c5732795d45912016b031dffe99e9ba39624
                                    • Opcode Fuzzy Hash: ae852570922ff721b190a9f4d5fbc998a96d6e43aba75d04e3a8d6f81e76ea1e
                                    • Instruction Fuzzy Hash: B501D6B1C056289BE7208B41DC85AD7BB79EB80310F1541F6D40D23340E2781FC6CE62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 836f9395f442052a780f0c0ecee08fe7e5f232a074e147f1028c9cad26efc8e5
                                    • Instruction ID: 0349fc33b981995ce8b5d324ff0e3e918d4b9bb75e812897729c2326c2efe9bd
                                    • Opcode Fuzzy Hash: 836f9395f442052a780f0c0ecee08fe7e5f232a074e147f1028c9cad26efc8e5
                                    • Instruction Fuzzy Hash: 02012D709483E46FD72197305C65BEB3B74AB42304F3106EAE185A90C3D2B54785DF21
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 7b05f504a742aa2f562cf1cd8b6236f6d89b506ae19ab8df8c3b68079ac7350e
                                    • Instruction ID: a551c4e3edd4c802aa378a715077420415fbdcc14d3c87fa4af8c247d00de97f
                                    • Opcode Fuzzy Hash: 7b05f504a742aa2f562cf1cd8b6236f6d89b506ae19ab8df8c3b68079ac7350e
                                    • Instruction Fuzzy Hash: 8F01C8709487E86FD7219B308CA5BEA3B74AB82714F2103DAE185A90D3C2B54785DB65
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: b6cd144d091ec84b0201f2d2d1e49fe604a71f7fa981eb158348ea9a69cc5b6e
                                    • Instruction ID: 2e800b48e2405c507fa75b8e5b3fb0a31165b54860553e67bd46ff6abdfad87a
                                    • Opcode Fuzzy Hash: b6cd144d091ec84b0201f2d2d1e49fe604a71f7fa981eb158348ea9a69cc5b6e
                                    • Instruction Fuzzy Hash: E40128709483E46EDB2197308C65BEA3F74AF82704F2116EAE1C5A90C3D2B54785DF21
                                    APIs
                                    • Wow64GetThreadContext.KERNEL32(?,?), ref: 0090350E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: e5362b341ebd38e74437f79b28858fd85c6ee4339fde20c519bf8302afbf22b4
                                    • Instruction ID: 4a2058c084fe15efb2389672fba5298a27058d9ef44cde77c2181e30bc4fa39d
                                    • Opcode Fuzzy Hash: e5362b341ebd38e74437f79b28858fd85c6ee4339fde20c519bf8302afbf22b4
                                    • Instruction Fuzzy Hash: 9DF0CDB2E0A43A8BEB208A49DC05AE7F7B8DB44325F1001F5EC0DA3350D9395EC18EC1
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 0041C902
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: ec11059d26b7692d4fa61c9163542e45d31aee0c8853dcbcf829fb0dfedf9589
                                    • Instruction ID: aaaf57848a4f69a74df0af8c6dc8587d1bcd015f373546b64ed740064c1f1fc6
                                    • Opcode Fuzzy Hash: ec11059d26b7692d4fa61c9163542e45d31aee0c8853dcbcf829fb0dfedf9589
                                    • Instruction Fuzzy Hash: 36F062F2C94215ABE7109624DCC5BEBB774FB08754F1040B6E90DA6240D6785FC18F55
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00927E67
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: c88e05f3810d5f0c2a7015b7038805f1f0c157094d991e73f38c3bd76390b611
                                    • Instruction ID: 58a5b3f4d08e437b939d39ab59cb1fc8894c46fdf1957a98d23ba760153cb523
                                    • Opcode Fuzzy Hash: c88e05f3810d5f0c2a7015b7038805f1f0c157094d991e73f38c3bd76390b611
                                    • Instruction Fuzzy Hash: 0BF062B1C0563D9BEB309B41DC85AD6BB78EB04310F0141FAD80D62240D6745FC5CFA2
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: bf75bbdce0d22473bf47551c1c650ba3579d1a90148a2f1473785b6d3a5ef229
                                    • Instruction ID: 8d43e0258a582611154e995a9db376bf4457b03417382ee76bc5f912921d0deb
                                    • Opcode Fuzzy Hash: bf75bbdce0d22473bf47551c1c650ba3579d1a90148a2f1473785b6d3a5ef229
                                    • Instruction Fuzzy Hash: 78F096B0D453985FEB2687208D65BEA7B34AB81710F1506DAE549BA2C2C2B11FC4DF11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 0ecfbaec0acbfba2d74faba536cab58ca65d7a9c4cf515ee0c2fdc669570c261
                                    • Instruction ID: 4102c378c0a365c891508939056204c61bb57569964f9346421ce577959659dd
                                    • Opcode Fuzzy Hash: 0ecfbaec0acbfba2d74faba536cab58ca65d7a9c4cf515ee0c2fdc669570c261
                                    • Instruction Fuzzy Hash: C8F0C2B5C8429A9EF7218B55DC897EA7734FF40314F2401FAD84916241D7392EDACE06
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 00beb67a97108ea359878560e3730f28e2be047d98630dba58de2503917f3169
                                    • Instruction ID: 00c52599ae566475032d00617cb103451fbe6f4de3aea4ae26af9b93eab069f6
                                    • Opcode Fuzzy Hash: 00beb67a97108ea359878560e3730f28e2be047d98630dba58de2503917f3169
                                    • Instruction Fuzzy Hash: 89F096709453985FEB2687208D65BEA7B34AB81710F1102DAE544BA1C2C2B01FC0DF10
                                    APIs
                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00930631
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: b806c9c0cbc18e3930c52b3aa662b7dd8fd8a640d1d2b56ed38f339c56b9e66f
                                    • Instruction ID: 611eebdcecd240fd9ec0f53173cae0579e10c997c7bba96996124601fb6494e3
                                    • Opcode Fuzzy Hash: b806c9c0cbc18e3930c52b3aa662b7dd8fd8a640d1d2b56ed38f339c56b9e66f
                                    • Instruction Fuzzy Hash: A5F0A7709483986EEB6157305C26BEB3B34AB81714F1506D6F584B90C3C2B55BC49F65
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0090FCA9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: bc7f8452d28c517886493e313f956477686baa4d26bbaee6a2dcabb82df77f95
                                    • Instruction ID: aa9ad4db2c130b065a3b15dd2c7393ed0ad8d91620982eecfcca500b554d8430
                                    • Opcode Fuzzy Hash: bc7f8452d28c517886493e313f956477686baa4d26bbaee6a2dcabb82df77f95
                                    • Instruction Fuzzy Hash: 6BF0F8B2A0D128DBEB30CB54DC54BEAB3B8AB48740F1046D9A80D92241DB35AED19F91
                                    APIs
                                    • ExitProcess.KERNEL32(D7402EF8), ref: 0041EB1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: a6d9dfd96aef1864b4077983a3253ad495e879bb8af6e179c4899c44d1ba5181
                                    • Instruction ID: 9e7a694e95cb7da723a5a1da34a3a83035f5137b9c701cac9cbe5ad93f0f23d3
                                    • Opcode Fuzzy Hash: a6d9dfd96aef1864b4077983a3253ad495e879bb8af6e179c4899c44d1ba5181
                                    • Instruction Fuzzy Hash: 30F08CB9D44259DEEB208A11DCCC7EA7334FB84311F2401B6D81A26280C6382EC99E0A
                                    APIs
                                    • WriteFile.KERNELBASE(?,?,39335C83,?,00000000), ref: 0093AACA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 86a55c5524a0fbf7a74c6e597a3e7af88a011291529ffd19e39e88275a4973b1
                                    • Instruction ID: a35198dbc36afa5c5183583be9dd76d8efee0ab2fd65c6a5edc6aeee3fc4ae83
                                    • Opcode Fuzzy Hash: 86a55c5524a0fbf7a74c6e597a3e7af88a011291529ffd19e39e88275a4973b1
                                    • Instruction Fuzzy Hash: 2DE06DB1D496189FDB24CA01CE81BBAF3B4FB44202F5041E9A80EA3300E6365E90CF82
                                    APIs
                                    • ExitProcess.KERNEL32(D7402EF8), ref: 0041EB1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 4b484ffa76752736d07f725a78da4f3f7c162ab2d24ef284ea40f4e7fef7f12a
                                    • Instruction ID: 53eeac8963da1a15ae9944b41a9808fbc2383cd4a62e39abba7d4ab5ff02253c
                                    • Opcode Fuzzy Hash: 4b484ffa76752736d07f725a78da4f3f7c162ab2d24ef284ea40f4e7fef7f12a
                                    • Instruction Fuzzy Hash: D5E04F759452A88EDB21CB55CC985DFB730FB84340F2146F6D84A56691C6342EC18E45
                                    APIs
                                    • CreateDirectoryW.KERNELBASE(?,00000000,00927A00,00927E9C,?,?,?,00927A00,?,?,?), ref: 00927FB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520846477.0000000000920000.00000040.00001000.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_920000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: CreateDirectory
                                    • String ID:
                                    • API String ID: 4241100979-0
                                    • Opcode ID: 01ed0c64d1628c405980cc92b5268ba959d8bec227148320baeb35d6de935af7
                                    • Instruction ID: 3f6cb9ab2be96952f19cd078f63a4cff856ad7df096d010f32dd26f8941290d5
                                    • Opcode Fuzzy Hash: 01ed0c64d1628c405980cc92b5268ba959d8bec227148320baeb35d6de935af7
                                    • Instruction Fuzzy Hash: 14E04FB0C046684BEB28CB80CC456F9B734EB50310F0441DAE54962645D6755AC5CE51
                                    APIs
                                    • ExitProcess.KERNEL32(D7402EF8), ref: 0041EB1A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 49c345a571e3be6f7da75dc14c5c971a0d93ddaa0bc72571f9b98773a8c2832f
                                    • Instruction ID: fa1699ddebaefca88b04a53868e20f570e70ea1e2e9c46d79a4dfe0b0b0f78b8
                                    • Opcode Fuzzy Hash: 49c345a571e3be6f7da75dc14c5c971a0d93ddaa0bc72571f9b98773a8c2832f
                                    • Instruction Fuzzy Hash: 92D06775D455688FC756CA81CC496D8B770BB99302F2005D6C44A66751D6302AC19E45
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 6874c0f5f910c48b9f377f771b08c1003916a2a7fa2e456aecf83be218bf2615
                                    • Instruction ID: 180f40408c241024dae0cf62937dee4c851c1fbc3b60fd88749657d7a85fa643
                                    • Opcode Fuzzy Hash: 6874c0f5f910c48b9f377f771b08c1003916a2a7fa2e456aecf83be218bf2615
                                    • Instruction Fuzzy Hash: 1571C2B1E0452C9FE7208A24DC49BFAB779FB81314F1441F9DA49DA680E6789EC5CF12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a509c7ecda87a232ba2b64e6dd4ca50396250fb463e466bfcc59a9914a99d0b1
                                    • Instruction ID: a600e51f31feef5295229230dcc3ce95b2bc4d98f3512809497dbdfaa1e0d07f
                                    • Opcode Fuzzy Hash: a509c7ecda87a232ba2b64e6dd4ca50396250fb463e466bfcc59a9914a99d0b1
                                    • Instruction Fuzzy Hash: 8271EFB1E0456C9FEB248B24DC94BFA7776FF82319F1841E9D64DA6240DA794EC0CE01
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 9e89ec0e7dd316c5e2ff7afc682c522f537dba450b69f5fac28b4c7c74478f03
                                    • Instruction ID: 488fc6110da3e810e0a7d639f47dafb655f88e2ed996c8431687fb2cb399e05d
                                    • Opcode Fuzzy Hash: 9e89ec0e7dd316c5e2ff7afc682c522f537dba450b69f5fac28b4c7c74478f03
                                    • Instruction Fuzzy Hash: 7251E270A0412D8FEB24CB20CC957FABB75FB42309F1882EEC64A96145E6385ED0CF42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0041A765
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 06a61e69d04b37221295af2c4ad9485268b36de450e7d0959f44e347b7a98932
                                    • Instruction ID: 3d81ff04424be14c48b57625c950b00db357e467a1b15672939b08afbc1fec3e
                                    • Opcode Fuzzy Hash: 06a61e69d04b37221295af2c4ad9485268b36de450e7d0959f44e347b7a98932
                                    • Instruction Fuzzy Hash: D85103B2E051559BE7108A14CC94AFF777AEB82311F2880BBDC4D9A640D63C9ED28A42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 49618e66abfa8f2086e12feedc8a496c5dd9ed24b70c587651337dd0609aacfd
                                    • Instruction ID: 48a07217a7b58c8f57b198e20e749e2321a0f742e60bf2dce8e8e99a9a64238a
                                    • Opcode Fuzzy Hash: 49618e66abfa8f2086e12feedc8a496c5dd9ed24b70c587651337dd0609aacfd
                                    • Instruction Fuzzy Hash: 39519CB1E441299FEB24CB14DC85BEABBB5FF85300F0441E9D94DA6282D7789ED1CE41
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: d50615baf585f498bbe5242710424a956d7a71443f3cd7fbd97bcaf625262d9d
                                    • Instruction ID: 85c3a2eca8cb602b2868fa693d9450b3fb2a18350ec4254f16984eb13cee1153
                                    • Opcode Fuzzy Hash: d50615baf585f498bbe5242710424a956d7a71443f3cd7fbd97bcaf625262d9d
                                    • Instruction Fuzzy Hash: AE41A1B2E0552C9FE7248A14DC59BFA7679FB81318F0840FAD64D96280E7B94FC48E42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0041A765
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: b7d2213f06332f7a0a61e03ef2949af1ed4cd01500d0c6b28b4b0d5c143cfd36
                                    • Instruction ID: 210502c76941dbec5fb3054a4451f716325695ce09277e0969f745675bfb7826
                                    • Opcode Fuzzy Hash: b7d2213f06332f7a0a61e03ef2949af1ed4cd01500d0c6b28b4b0d5c143cfd36
                                    • Instruction Fuzzy Hash: 043158B2C041949FF3209A20DD4CBEB3A68EF81314F2844F7E849962C1D2BD4ED6CA57
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: ce97060a32973f93f9467e06ade7d49fe6745fd3a6c87e0a4ce87889c7d7b2d1
                                    • Instruction ID: 8ed26f060df5e6f2663143543ced54276c41f188f008070430f1a00747a2fd59
                                    • Opcode Fuzzy Hash: ce97060a32973f93f9467e06ade7d49fe6745fd3a6c87e0a4ce87889c7d7b2d1
                                    • Instruction Fuzzy Hash: A241DEB0E4512D9FFB248B24CC49BFABA79FB91304F1042F9D54D96281D6B85ED1CE41
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 907c32b54d530066ccdc700a404bd0125b8112fc6ff0f3931a97be4fa41bb1dd
                                    • Instruction ID: 689012e7989bcb27511818f72974501e7f4858ad675787a517e89c3e576c06f7
                                    • Opcode Fuzzy Hash: 907c32b54d530066ccdc700a404bd0125b8112fc6ff0f3931a97be4fa41bb1dd
                                    • Instruction Fuzzy Hash: D741A170A0916D8FEB248B24CC997FAB7B4FB42315F1442E9D5899A181D7785ED0CF02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: b63f37dce359e32c705f34230a50e65cd9e4e936fb149e3664a9294293441f0e
                                    • Instruction ID: 5c6c58312c67d6f64b987274f795f163802a7709cc2ee9c5ad1d25f3ad3c7a01
                                    • Opcode Fuzzy Hash: b63f37dce359e32c705f34230a50e65cd9e4e936fb149e3664a9294293441f0e
                                    • Instruction Fuzzy Hash: 6A3180B1E1512C9FEB249A24DC597FA7679FF81304F1841F9D64D96280E7B85EC08F02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0041A765
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 29080d96b95a6c36101a227888c6101e968bc040e2918fe26203054658d55746
                                    • Instruction ID: d570770a524d128368dbe623f5d9a5287152d361d6ed24f1753d7f1ecad7c6b4
                                    • Opcode Fuzzy Hash: 29080d96b95a6c36101a227888c6101e968bc040e2918fe26203054658d55746
                                    • Instruction Fuzzy Hash: A831AFB2D041559FE7208A14DD89BFBB778EB84310F2440B7EC0DA7680D6789EC68A56
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 6427ad70b8a6e71b14d44b891e10573e21b0c0d1206dcf283a2e2005312295e6
                                    • Instruction ID: c32db67ff743222b9c7256c0bfbd884225296f3defad5ad7bcfbc7fd8a2ccf3a
                                    • Opcode Fuzzy Hash: 6427ad70b8a6e71b14d44b891e10573e21b0c0d1206dcf283a2e2005312295e6
                                    • Instruction Fuzzy Hash: 6B3192B1E1552C8FEB248A14DC497FA7679FF91304F1441FAD64D96280E6B85EC1CF02
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: c5e23b887a73ba4463e5d6b2aa0441aa84304a7c0074681eaa96e7a314029b58
                                    • Instruction ID: a4891003f5b930495f5483d3803cd1c2d5d802719cf55d40130af378dc3c1941
                                    • Opcode Fuzzy Hash: c5e23b887a73ba4463e5d6b2aa0441aa84304a7c0074681eaa96e7a314029b58
                                    • Instruction Fuzzy Hash: 84310670A0926C9FEB249F24C8897F977B4FB42304F1001EDD68999182D7B84ED1CF02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 2224f439385162fd301ab811778ece9defcc2287510a1ed21558d66ff9041f6c
                                    • Instruction ID: 9f1617896e6d95733f38d9ed517e39c3e0539239ea771b73e43f72b3e25187eb
                                    • Opcode Fuzzy Hash: 2224f439385162fd301ab811778ece9defcc2287510a1ed21558d66ff9041f6c
                                    • Instruction Fuzzy Hash: 2B31AFB0A4512D9FFB248F24CC59BF9B779FB92314F1041E9D5499A281DAB85EC1CF01
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: fb6d81eca2fa5af27d30ee4700f41b4d83ff7fd485674375b8065b78594a9b4c
                                    • Instruction ID: 285401a40f0605f964f262d8f0cbc7eae4f972b2b8aaece5280fed91b7c440eb
                                    • Opcode Fuzzy Hash: fb6d81eca2fa5af27d30ee4700f41b4d83ff7fd485674375b8065b78594a9b4c
                                    • Instruction Fuzzy Hash: 0E318070A0912D8FEB24CE15D949BE9B7B5FF82304F1441EDD9899A281E7B45ED0CF82
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: ab792f98daa9152bdeb5b580cb51dd8d1f036de8d0f5729ff18366067c5d3c7e
                                    • Instruction ID: 9f8c441469d73266740a0a197bb56e5b88b8343537225666f80bf160cf030b65
                                    • Opcode Fuzzy Hash: ab792f98daa9152bdeb5b580cb51dd8d1f036de8d0f5729ff18366067c5d3c7e
                                    • Instruction Fuzzy Hash: 7F317CB0A4512C8FEB249B14C8597F9B6B9FF52304F0441E9D64996280E7B85EC0CF42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 0ec6fd05c990fb177cd30a2e324e6dc882e21cd6d2467c619534d91d1e2478f6
                                    • Instruction ID: b4b040189f17bbd14b25c29c4ac0efddb2adaca9953017c325f7653b7e0edd46
                                    • Opcode Fuzzy Hash: 0ec6fd05c990fb177cd30a2e324e6dc882e21cd6d2467c619534d91d1e2478f6
                                    • Instruction Fuzzy Hash: BB31BF70A0922CCFEB248F24C8497F9B7B5FB42314F1401E9D68996181E7B45ED0CF02
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 0ddb9c4d3f6461fa0a06a459722400da86cca77ecdf52b02c10173b0aaf6240d
                                    • Instruction ID: a1584798c39e5dc6d763eb1cd409c94edd0d851fcef558a1391c1a89b43d5eb5
                                    • Opcode Fuzzy Hash: 0ddb9c4d3f6461fa0a06a459722400da86cca77ecdf52b02c10173b0aaf6240d
                                    • Instruction Fuzzy Hash: A121C470A0926C9FEB208F25C8497EABB75FF92304F0401EDD6899A182D7B44ED4CF42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 5183480aa0b440dad06a0e59b8a558d1d888181f103cd053aebf900d89086b44
                                    • Instruction ID: 63259a3d95ab5c5c091bdd9025c408f158504e1e3cd9cdf0d7f715296971c9fc
                                    • Opcode Fuzzy Hash: 5183480aa0b440dad06a0e59b8a558d1d888181f103cd053aebf900d89086b44
                                    • Instruction Fuzzy Hash: 2021B2B0A4512D9FEB208E14DC497EAB779FB46314F0400E9DA4996241D7B95ED0CF42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 2c45ef62b780a3a200a79ecc01241998db3e781816f6f769dc0521fb94dd9b18
                                    • Instruction ID: b8909aa3cf733088cf4a4adad580cbc195c2c0f5d87253fa0b98a157460cc60f
                                    • Opcode Fuzzy Hash: 2c45ef62b780a3a200a79ecc01241998db3e781816f6f769dc0521fb94dd9b18
                                    • Instruction Fuzzy Hash: C821AF70A4512C8FEB248F15C849BE9B779FB82304F1441E9D5899A141D7B49ED1CF02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: c7f464a65d02188d2ee8460061d8ded33d67b0e9a6fad5a89614a3ad81e79987
                                    • Instruction ID: be63a9a1e74272839cc247fe0a8751c20f0bf3bf8f1ba54410bdf8c55fb05c88
                                    • Opcode Fuzzy Hash: c7f464a65d02188d2ee8460061d8ded33d67b0e9a6fad5a89614a3ad81e79987
                                    • Instruction Fuzzy Hash: FE218C70A0926C8FEB24CF24C8497E9BBB5FF46304F0441D9D689AA182D7B45ED0CF42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: a020afe7b41f47b97a0098f4070571b7fc7cba30ace9b95ec7603f8bc82b07d8
                                    • Instruction ID: dd355f477101e9d9fb01da80314369295e7c51394a1760f3f4cfcaaf127d410d
                                    • Opcode Fuzzy Hash: a020afe7b41f47b97a0098f4070571b7fc7cba30ace9b95ec7603f8bc82b07d8
                                    • Instruction Fuzzy Hash: C7217C70A4522DCFEB248F25C8497E9BBB9FB46304F0400E9D589AA181D7B45ED0CF42
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0090D49F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 03f27b90ac4b99cb948c9259d21fe80c0cd3d34fa65889c731042f178f676ff2
                                    • Instruction ID: 89b4a337da3eb5096f4a33812ba3ca0a268ff1206cc8c18651c3202d83df1ff9
                                    • Opcode Fuzzy Hash: 03f27b90ac4b99cb948c9259d21fe80c0cd3d34fa65889c731042f178f676ff2
                                    • Instruction Fuzzy Hash: F01168E2E5E3089EFB280AA4DC697BA7A68D741710F1441BFDA0B145C2D5BD2BC08563
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0090D49F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 4df710cc511ab3e1a476f22e4b414b27eb6dcc7059dca2a96385b01a6f229788
                                    • Instruction ID: 8b840d0ad07e742bda48a9cc5ce608f82accb98d3afcbea4ee9b4a320ca2ec9c
                                    • Opcode Fuzzy Hash: 4df710cc511ab3e1a476f22e4b414b27eb6dcc7059dca2a96385b01a6f229788
                                    • Instruction Fuzzy Hash: 3A0128E2E5E3089EFB280690DC597B67A68D741725F1441BEDA0A141C1D5BD2AC08563
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 33211f2559424aeb37ad58b17db63fa7e396f1b4362fb22b52064d52a0c2edfe
                                    • Instruction ID: bf6ab99218b63dc2722b2b40758cf5fe75a1634b5911682d0a60698210b1aa4d
                                    • Opcode Fuzzy Hash: 33211f2559424aeb37ad58b17db63fa7e396f1b4362fb22b52064d52a0c2edfe
                                    • Instruction Fuzzy Hash: 33219A70A4922C8FEB24CF24C8597E9B7B5FF42308F0441D9D689AA181D7B88ED4CF02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 008F68B4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1520757764.00000000008F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8f0000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 08a928a999e95b40d124416526e2213aac4a38d20a6c1124ea9b7a7c42421095
                                    • Instruction ID: b480bf9f3d65ac69f07e10bc9eea8cdbac6650a902ff8faab924a4fe9dd35b1f
                                    • Opcode Fuzzy Hash: 08a928a999e95b40d124416526e2213aac4a38d20a6c1124ea9b7a7c42421095
                                    • Instruction Fuzzy Hash: 89215870A4922DCFEB248F24C8497E9B7B5FB46304F0441D9D589AA281DBB49ED0CF02
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0041A765
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1519755457.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1519711277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519836452.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.000000000044E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519868204.0000000000454000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.00000000004BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1519921116.000000000055E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_PDFonlineseguro.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: f299c123f6a1141e2bfcddf222696ac1948d9bb74d6550779eb58fda38854e01
                                    • Instruction ID: d742e8a0be69d366727acb49402eb69a7df7b83cbe85b0c4f3b44d59bb3f023f
                                    • Opcode Fuzzy Hash: f299c123f6a1141e2bfcddf222696ac1948d9bb74d6550779eb58fda38854e01
                                    • Instruction Fuzzy Hash: F0018FF2D45259AFF3118510DC89BFB7638EB84324F2500B7E90D96380D6BD9FC68A56