Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MicrosoftOfficeWord.exe

Overview

General Information

Sample name:MicrosoftOfficeWord.exe
Analysis ID:1587447
MD5:2db79d70849a29f5c04cdc4ef1e40674
SHA1:69104324e2f4c6516ccfaf1ac86012a1376bd2f7
SHA256:92e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0
Tags:exeuser-zhuzhu0009
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MicrosoftOfficeWord.exe (PID: 8120 cmdline: "C:\Users\user\Desktop\MicrosoftOfficeWord.exe" MD5: 2DB79D70849A29F5C04CDC4EF1E40674)
    • csc.exe (PID: 5932 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2531358241.0000000009D90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000007.00000002.2530178907.0000000008762000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: csc.exe PID: 5932JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          7.2.csc.exe.9d90000.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            7.2.csc.exe.87e6a48.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MicrosoftOfficeWord.exeAvira: detected
              Source: MicrosoftOfficeWord.exeReversingLabs: Detection: 65%
              Source: MicrosoftOfficeWord.exeVirustotal: Detection: 69%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

              Compliance

              barindex
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeUnpacked PE file: 4.2.MicrosoftOfficeWord.exe.4460000.2.unpack
              Source: MicrosoftOfficeWord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: MicrosoftOfficeWord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: MicrosoftOfficeWord.exe
              Source: Binary string: Fxjvdwlxzkd.pdb source: csc.exe, 00000007.00000002.2530999315.0000000009C20000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.000000000885C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: MicrosoftOfficeWord.exe
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_0040F130 GetCurrentProcess,GetMappedFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,4_2_0040F130
              Source: global trafficTCP traffic: 192.168.2.10:49821 -> 181.71.216.203:30203
              Source: Joe Sandbox ViewIP Address: 181.71.216.203 181.71.216.203
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: newstaticfreepoint24.ddns-ip.net
              Source: csc.exe, 00000007.00000002.2528762930.000000000781D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: MicrosoftOfficeWord.exeString found in binary or memory: https://zoom.us/privacy/Zoom
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_004300A04_2_004300A0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00430BEA4_2_00430BEA
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_0040DC504_2_0040DC50
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_004304AC4_2_004304AC
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00403F134_2_00403F13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_05A142C57_2_05A142C5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_05A142C87_2_05A142C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D1D5E07_2_09D1D5E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D157587_2_09D15758
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D1D9177_2_09D1D917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D14DC07_2_09D14DC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D14DBC7_2_09D14DBC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D135777_2_09D13577
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D157497_2_09D15749
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D136977_2_09D13697
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D1E6887_2_09D1E688
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E42D607_2_09E42D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E421487_2_09E42148
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E474B07_2_09E474B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E446407_2_09E44640
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E449E17_2_09E449E1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E474A17_2_09E474A1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E478B97_2_09E478B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E424907_2_09E42490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E446317_2_09E44631
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E713A87_2_09E713A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7FA887_2_09E7FA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7F1D87_2_09E7F1D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7F1887_2_09E7F188
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7FA787_2_09E7FA78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7FA507_2_09E7FA50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7E4D47_2_09E7E4D4
              Source: MicrosoftOfficeWord.exeBinary or memory string: OriginalFilename vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exe, 00000004.00000002.1462191608.00000000044EC000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYxttxbmsat.exe" vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exeBinary or memory string: OriginalFilenameZoom* vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal88.evad.winEXE@3/0@1/1
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_004113D0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,4_2_004113D0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00411A50 CoInitializeEx,CoUninitialize,CoCreateInstance,SysAllocString,SysFreeString,CoSetProxyBlanket,_com_issue_error,4_2_00411A50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\mono1234
              Source: MicrosoftOfficeWord.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: MicrosoftOfficeWord.exeReversingLabs: Detection: 65%
              Source: MicrosoftOfficeWord.exeVirustotal: Detection: 69%
              Source: unknownProcess created: C:\Users\user\Desktop\MicrosoftOfficeWord.exe "C:\Users\user\Desktop\MicrosoftOfficeWord.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: crowdstrikeceoisextragay.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: sentinelisabadedrtrynexttimemaybe.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: MicrosoftOfficeWord.exeStatic file information: File size 3567616 > 1048576
              Source: MicrosoftOfficeWord.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x33c000
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: MicrosoftOfficeWord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: MicrosoftOfficeWord.exe
              Source: Binary string: Fxjvdwlxzkd.pdb source: csc.exe, 00000007.00000002.2530999315.0000000009C20000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.000000000885C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: MicrosoftOfficeWord.exe

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeUnpacked PE file: 4.2.MicrosoftOfficeWord.exe.4460000.2.unpack
              Source: Yara matchFile source: 7.2.csc.exe.9d90000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.csc.exe.87e6a48.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.2531358241.0000000009D90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2530178907.0000000008762000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 5932, type: MEMORYSTR
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: MicrosoftOfficeWord.exeStatic PE information: real checksum: 0x6698e should be: 0x36d21b
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_0040E90C push es; ret 4_2_0040E91C
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414F64 push ecx; ret 4_2_00414F77
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_05A1780C pushad ; iretd 7_2_05A17825
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_073851FD push ebx; ret 7_2_07385203
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13891 push edi; iretd 7_2_09D13892
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13889 push edi; iretd 7_2_09D1388A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13840 push edi; iretd 7_2_09D13842
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13860 push edi; iretd 7_2_09D13862
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13868 push edi; iretd 7_2_09D1386A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13577 push edi; iretd 7_2_09D1383A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D146D8 pushad ; iretd 7_2_09D146DA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D13697 push edi; iretd 7_2_09D1383A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7519C push 8B53D08Bh; iretd 7_2_09E75161
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7C150 push esp; iretd 7_2_09E7C151
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09E7BA80 push eax; retf 7_2_09E7BA81
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 5A10000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 75C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 72E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 8252Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 1603Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeAPI coverage: 0.9 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep count: 36 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -33204139332677172s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59891s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6112Thread sleep count: 8252 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6112Thread sleep count: 1603 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59766s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59656s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59546s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59434s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59328s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59219s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59107s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -59000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58890s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58672s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58453s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58344s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58234s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58125s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -58016s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57906s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57797s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57687s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57578s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57469s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57359s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57250s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57141s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -57031s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56922s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56812s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56702s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56537s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56391s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56219s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56109s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -56000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55891s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55781s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55671s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55562s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55452s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55343s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55234s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55125s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -55016s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54891s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54766s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54656s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54547s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54437s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6104Thread sleep time: -54328s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_0040F130 GetCurrentProcess,GetMappedFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,4_2_0040F130
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59434Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59107Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 59000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 58016Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57141Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 57031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56702Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56537Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 56000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55452Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 55016Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 54328Jump to behavior
              Source: csc.exe, 00000007.00000002.2525053423.0000000005893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllache
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 7_2_09D1FAC0 LdrInitializeThunk,7_2_09D1FAC0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414A32 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00414A32
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_0040D830 GetModuleFileNameW,SHGetSpecialFolderPathW,GetProcessHeap,HeapAlloc,SHGetSpecialFolderPathW,GetWindowsDirectoryW,GetProcessHeap,HeapAlloc,4_2_0040D830
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414A32 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00414A32
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414BA6 SetUnhandledExceptionFilter,4_2_00414BA6
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_004146B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_004146B4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5400000Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 51CA008Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00411F70 OpenProcessToken,GetLastError,DuplicateTokenEx,GetLastError,AllocateAndInitializeSid,GetLastError,CreateWellKnownSid,GetLastError,GetProcessHeap,HeapAlloc,GetLastError,CreateWellKnownSid,GetLastError,CreateRestrictedToken,GetLastError,AllocateAndInitializeSid,GetLastError,SetTokenInformation,GetLastError,CloseHandle,CloseHandle,FreeSid,GetProcessHeap,HeapFree,FreeSid,CloseHandle,4_2_00411F70
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414851 cpuid 4_2_00414851
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 4_2_00414C65 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00414C65
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: csc.exe, 00000007.00000003.1481198731.000000000A0C8000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2525053423.00000000057E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
              Windows Management Instrumentation
              1
              DLL Side-Loading
              31
              Process Injection
              11
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              LSASS Memory151
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Process Injection
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture1
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync134
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MicrosoftOfficeWord.exe66%ReversingLabsWin32.Trojan.Leonem
              MicrosoftOfficeWord.exe69%VirustotalBrowse
              MicrosoftOfficeWord.exe100%AviraTR/Crypt.XPACK.Gen3
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              newstaticfreepoint24.ddns-ip.net
              181.71.216.203
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netcsc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-neticsc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netJcsc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://zoom.us/privacy/ZoomMicrosoftOfficeWord.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000007.00000002.2528762930.000000000781D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354csc.exe, 00000007.00000003.1696846210.0000000008B75000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000007.00000002.2531479442.0000000009DF0000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000007.00000003.1696846210.0000000008A3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                181.71.216.203
                                newstaticfreepoint24.ddns-ip.netColombia
                                27831ColombiaMovilCOfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1587447
                                Start date and time:2025-01-10 11:41:32 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 31s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:11
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:MicrosoftOfficeWord.exe
                                Detection:MAL
                                Classification:mal88.evad.winEXE@3/0@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 86%
                                • Number of executed functions: 92
                                • Number of non-executed functions: 62
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                TimeTypeDescription
                                05:42:44API Interceptor1746560x Sleep call for process: csc.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                181.71.216.203AdobePDF.exeGet hashmaliciousUnknownBrowse
                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                    PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                      AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                        2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          newstaticfreepoint24.ddns-ip.netAdobePDF.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                          • 181.71.216.203
                                          SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                          • 181.131.217.244
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ColombiaMovilCOAdobePDF.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                          • 181.71.216.203
                                          1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 179.15.136.6
                                          6.elfGet hashmaliciousUnknownBrowse
                                          • 181.70.170.80
                                          173634822473cd620521fcc8b42a4aac25bbd1c3f6e30c324045b1411f9747e93f432d0281839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 179.15.136.6
                                          1736348224ad77cf86e491faad27e4b5decf1eb0bb26f16b0527e5ef488389ba353aa3db79582.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 179.15.136.6
                                          17363482247f60133f013d62aae38c531ac95bb55a200a243b0e15fa7cf8e8923b2a10590f952.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 179.15.136.6
                                          1736348224f7603a5c535b2b2f6cc29730626d73a967c67551d2d14f73b547fe7b5fc10393994.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                          • 179.15.136.6
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.133380080323117
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:MicrosoftOfficeWord.exe
                                          File size:3'567'616 bytes
                                          MD5:2db79d70849a29f5c04cdc4ef1e40674
                                          SHA1:69104324e2f4c6516ccfaf1ac86012a1376bd2f7
                                          SHA256:92e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0
                                          SHA512:f4b7fb079d320bdad76c47a6f61ac7dc61f7c5159df65292645e3046c63bb4e02438bb06eff37a98297163b6c53f1d313c4dd5ec4b1ff1aceae07356831d957e
                                          SSDEEP:49152:Usxci/uNQrNcXei/uNXQVNcXei/uNQ4NcXei/uNkqO10oh7JDfglOXv:U84N8NtNfqW0udfglOf
                                          TLSH:46F58CB8E76FEC42D8216A7F1092634E0323DEFE594385975248F764A4B3EC439E8467
                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........rt..............k.......f.......f.......f.......f.......{.......{.......f.......f..........=....f.......f...............f.....
                                          Icon Hash:e082c4e4ae8c82e8
                                          Entrypoint:0x414670
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6743E4D1 [Mon Nov 25 02:45:37 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:6
                                          OS Version Minor:0
                                          File Version Major:6
                                          File Version Minor:0
                                          Subsystem Version Major:6
                                          Subsystem Version Minor:0
                                          Import Hash:73fea8e21025ec6f368037fae3afc60a
                                          Signature Valid:
                                          Signature Issuer:
                                          Signature Validation Error:
                                          Error Number:
                                          Not Before, Not After
                                            Subject Chain
                                              Version:
                                              Thumbprint MD5:
                                              Thumbprint SHA-1:
                                              Thumbprint SHA-256:
                                              Serial:
                                              Instruction
                                              call 00007F4A84668A82h
                                              jmp 00007F4A846682ADh
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              mov esi, dword ptr [ebp+08h]
                                              push dword ptr [esi]
                                              call 00007F4A84668CA3h
                                              push dword ptr [ebp+14h]
                                              mov dword ptr [esi], eax
                                              push dword ptr [ebp+10h]
                                              push dword ptr [ebp+0Ch]
                                              push esi
                                              push 00413F30h
                                              push 00429024h
                                              call 00007F4A84668BD4h
                                              add esp, 1Ch
                                              pop esi
                                              pop ebp
                                              ret
                                              jmp 00007F4A84667CB6h
                                              push ebp
                                              mov ebp, esp
                                              push 00000000h
                                              call dword ptr [0041932Ch]
                                              push dword ptr [ebp+08h]
                                              call dword ptr [00419324h]
                                              push C0000409h
                                              call dword ptr [00419270h]
                                              push eax
                                              call dword ptr [00419368h]
                                              pop ebp
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000324h
                                              push 00000017h
                                              call dword ptr [00419330h]
                                              test eax, eax
                                              je 00007F4A84668447h
                                              push 00000002h
                                              pop ecx
                                              int 29h
                                              mov dword ptr [0042CB80h], eax
                                              mov dword ptr [0042CB7Ch], ecx
                                              mov dword ptr [0042CB78h], edx
                                              mov dword ptr [0042CB74h], ebx
                                              mov dword ptr [0042CB70h], esi
                                              mov dword ptr [0042CB6Ch], edi
                                              mov word ptr [0042CB98h], ss
                                              mov word ptr [0042CB8Ch], cs
                                              mov word ptr [0042CB68h], ds
                                              mov word ptr [0042CB64h], es
                                              mov word ptr [00000000h], fs
                                              Programming Language:
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x248e80x1cc.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x33becc.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x588000x5f38.rsrc
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x2acc.rsrc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x21cd80x70.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x21e400x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x21d480x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x190000x5b8.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x180000x17e00194a7255282fe9d7ae81b72636d3958eFalse0.4041639397905759data6.147389640020991IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x190000x100000xf400705b94a546f1abb8fba1e84ce4933d03False0.29005507172131145data5.0324726546167895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x290000x50000x3a0022c50ae1b95257f8c3a44ff7a2de2c94False0.10162984913793104data2.0443500313558287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x2e0000x33becc0x33c0004d3fa0f36523000af465d39a2916abf9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_CURSOR0x2e72c0x2ecdata0.56951871657754
                                              RT_CURSOR0x2ea180x2ecTarga image data 64 x 65536 x 1 +32 "\004"0.4117647058823529
                                              RT_BITMAP0x2ed040x5428Device independent bitmap graphic, 224 x 32 x 24, image size 0, resolution 3780 x 3780 px/m0.1578165614556257
                                              RT_BITMAP0x3412c0xbd28Device independent bitmap graphic, 336 x 48 x 24, image size 0, resolution 3780 x 3780 px/m0.13666776804890138
                                              RT_BITMAP0x3fe540x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.5168697022617881
                                              RT_BITMAP0xb28780x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.6944626655875964
                                              RT_BITMAP0x12529c0x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.701893342420241
                                              RT_BITMAP0x197cc00x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.7138369467989948
                                              RT_ICON0x20a6e40xc5c0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.6268963337547409
                                              RT_ICON0x216ca40x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.1756923691451904
                                              RT_ICON0x258ccc0x6375fPC bitmap, Windows 3.x format, 51811 x 2 x 49, image size 407651, cbSize 407391, bits offset 540.9921942310949432
                                              RT_ICON0x2bc42c0x528Device independent bitmap graphic, 16 x 32 x 32, image size 1280EnglishUnited States0.4401515151515151
                                              RT_ICON0x2bc9540xb68Device independent bitmap graphic, 24 x 48 x 32, image size 2880EnglishUnited States0.29486301369863016
                                              RT_ICON0x2bd4bc0x1428Device independent bitmap graphic, 32 x 64 x 32, image size 5120EnglishUnited States0.23507751937984497
                                              RT_ICON0x2be8e40x2d28Device independent bitmap graphic, 48 x 96 x 32, image size 11520EnglishUnited States0.17439446366782008
                                              RT_ICON0x2c160c0x5028Device independent bitmap graphic, 64 x 128 x 32, image size 20480EnglishUnited States0.12339181286549708
                                              RT_ICON0x2c66340x14028Device independent bitmap graphic, 128 x 256 x 32, image size 81920EnglishUnited States0.0954123962908736
                                              RT_ICON0x2da65c0xc16dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0005250721974273
                                              RT_RCDATA0x2e67cc0xfd8PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0027120315581854
                                              RT_RCDATA0x2e77a40x9d36PNG image data, 98 x 102, 8-bit/color RGBA, non-interlaced0.33521343736023457
                                              RT_RCDATA0x2f14dc0x9d36PNG image data, 98 x 102, 8-bit/color RGBA, non-interlaced0.24362669582070268
                                              RT_RCDATA0x2fb2140xcbf0Delphi compiled form 'TfFileProperties'0.31453034017775056
                                              RT_RCDATA0x307e040x3c248Delphi compiled form 'TfMain'0.6290065924073653
                                              RT_GROUP_ICON0x34404c0x68dataEnglishUnited States0.7403846153846154
                                              RT_VERSION0x3440b40x364dataEnglishUnited States0.43317972350230416
                                              RT_ANIICON0x3444180x25932PC bitmap, Windows 3.x format, 19581 x 2 x 38, image size 154747, cbSize 153906, bits offset 540.9913128792899563
                                              RT_MANIFEST0x369d4c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                              DLLImport
                                              KERNEL32.dllGetCurrentThreadId, QueryDosDeviceW, VirtualProtect, HeapFree, EnterCriticalSection, GetCurrentProcess, ReleaseSemaphore, WriteFile, GetModuleFileNameW, WaitForMultipleObjects, LeaveCriticalSection, InitializeCriticalSection, SetFilePointer, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, CreateEventW, Process32NextW, CreateFileA, SetEvent, Process32FirstW, FreeLibrary, HeapAlloc, GetWindowsDirectoryW, VerSetConditionMask, GetProcessHeap, GetModuleHandleW, CreateSemaphoreW, FlushInstructionCache, VerifyVersionInfoW, CreateDirectoryA, SetDllDirectoryW, VirtualQuery, LoadLibraryExW, FlushFileBuffers, LocalFree, SetErrorMode, GetPrivateProfileStringW, GetTempFileNameW, CreateFileW, OutputDebugStringW, IsWow64Process, MultiByteToWideChar, SetConsoleCtrlHandler, IsDebuggerPresent, InitializeCriticalSectionAndSpinCount, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, CreateThread, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetProcAddress, LoadLibraryW, ExitProcess, DeleteCriticalSection, CloseHandle, DeleteFileW, TerminateThread, GetLastError, GetTickCount64, Sleep, WaitForSingleObject, InitializeCriticalSectionEx, TerminateProcess, CreateDirectoryW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead
                                              USER32.dllGetMessageW, GetUserObjectInformationA, SetTimer, TranslateMessage, PostThreadMessageW, DispatchMessageW, GetProcessWindowStation, MessageBoxW
                                              ADVAPI32.dllGetTokenInformation, RegGetValueW, RegOpenKeyExW, OpenProcessToken, RegEnumKeyExW, RegCloseKey, DuplicateTokenEx, FreeSid, CreateRestrictedToken, ImpersonateLoggedOnUser, CreateWellKnownSid, AllocateAndInitializeSid, SetTokenInformation, RevertToSelf
                                              SHELL32.dllSHGetKnownFolderPath, SHGetSpecialFolderPathW, ShellExecuteExW, SHGetSpecialFolderPathA
                                              ole32.dllCoInitialize, CoUninitialize, CoTaskMemFree, CoInitializeEx, CoSetProxyBlanket, OleRun, CoCreateInstance
                                              OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
                                              SHLWAPI.dllPathAppendW, PathIsRelativeW
                                              PSAPI.DLLGetModuleInformation, GetModuleFileNameExW, GetMappedFileNameW, EnumProcessModules
                                              WINTRUST.dllWinVerifyTrust, WTHelperProvDataFromStateData, WTHelperGetProvCertFromChain, WTHelperGetProvSignerFromChain
                                              CRYPT32.dllCertGetNameStringW
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 11:42:45.031132936 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:42:45.035896063 CET3020349821181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:42:45.035996914 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:42:45.067748070 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:42:45.072511911 CET3020349821181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:42:45.072563887 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:42:45.077327967 CET3020349821181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:06.397931099 CET3020349821181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:06.398087978 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.401679039 CET4982130203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.406487942 CET3020349821181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:06.534713030 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.539678097 CET3020349958181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:06.539911985 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.540801048 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.545620918 CET3020349958181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:06.545804024 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:06.550565958 CET3020349958181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:27.898144960 CET3020349958181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:27.898238897 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:27.898416042 CET4995830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:27.903284073 CET3020349958181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:28.003453970 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:28.008430958 CET3020349978181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:28.008588076 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:28.009362936 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:28.014157057 CET3020349978181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:28.014348984 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:28.019180059 CET3020349978181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:49.367851019 CET3020349978181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:49.367919922 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.368103981 CET4997830203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.372860909 CET3020349978181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:49.472497940 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.610613108 CET3020349979181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:49.610744953 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.611757040 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.616534948 CET3020349979181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:43:49.616717100 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:43:49.621543884 CET3020349979181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:10.979789972 CET3020349979181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:10.979887009 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:10.980119944 CET4997930203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:10.985913992 CET3020349979181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:11.097255945 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:11.102202892 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:11.102336884 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:11.103142977 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:11.107934952 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:11.108015060 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:11.112775087 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:16.019439936 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:16.026477098 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:16.026561975 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:16.032449007 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:26.317095041 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:26.322016001 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:26.322113037 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:26.326915026 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:26.362420082 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:26.367386103 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:26.367438078 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:26.372454882 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:27.268685102 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:27.273497105 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:27.274081945 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:27.278918982 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:30.017334938 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:30.022139072 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:30.022243023 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:30.027020931 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:32.467533112 CET3020349980181.71.216.203192.168.2.10
                                              Jan 10, 2025 11:44:32.469715118 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:32.469715118 CET4998030203192.168.2.10181.71.216.203
                                              Jan 10, 2025 11:44:32.474555016 CET3020349980181.71.216.203192.168.2.10
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 11:42:45.007333040 CET5643253192.168.2.101.1.1.1
                                              Jan 10, 2025 11:42:45.029206991 CET53564321.1.1.1192.168.2.10
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 10, 2025 11:42:45.007333040 CET192.168.2.101.1.1.10xb3a9Standard query (0)newstaticfreepoint24.ddns-ip.netA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 10, 2025 11:42:45.029206991 CET1.1.1.1192.168.2.100xb3a9No error (0)newstaticfreepoint24.ddns-ip.net181.71.216.203A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:4
                                              Start time:05:42:23
                                              Start date:10/01/2025
                                              Path:C:\Users\user\Desktop\MicrosoftOfficeWord.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\MicrosoftOfficeWord.exe"
                                              Imagebase:0x400000
                                              File size:3'567'616 bytes
                                              MD5 hash:2DB79D70849A29F5C04CDC4EF1E40674
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:7
                                              Start time:05:42:42
                                              Start date:10/01/2025
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                              Imagebase:0xcf0000
                                              File size:2'141'552 bytes
                                              MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2531358241.0000000009D90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2530178907.0000000008762000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2528762930.00000000075C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:8
                                                Total number of Limit Nodes:1
                                                execution_graph 11659 4144e2 11673 403fe4 11659->11673 11676 4040bb 11673->11676 11674 40a472 ExitProcess 11675 406925 11676->11674 11676->11675 11677 4085bd 11678 4085cb VirtualProtect 11677->11678 11681 40864f ExitProcess 11678->11681
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_
                                                • String ID: E$GetModuleHandleExW$L$L$LoadLibraryW$P$P$V$W$]$a$a$a$b$bmp$c$c$d$e$e$gif$i$i$i$jpg$l$o$o$o$png$r$r$r$r$r$s$s$t$t$t$t$u$x$y
                                                • API String ID: 2427045233-3217341300
                                                • Opcode ID: 24c789fa4daecbd349568caf682134c91fe02bd9c879d5a9ec86189862ec8d49
                                                • Instruction ID: 8772a5d91f2c69b3084cbf90925906af69786a0451df771bb4d847c438c2977d
                                                • Opcode Fuzzy Hash: 24c789fa4daecbd349568caf682134c91fe02bd9c879d5a9ec86189862ec8d49
                                                • Instruction Fuzzy Hash: 20D208B4A052A8CBDB24CB18C988BDDBBB1AF45314F1081EAE459BB381D7755F81CF19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$E$G$H$L$L$L$L$M$P$W$W$W$a$a$a$a$a$b$b$c$d$d$d$d$e$e$e$e$i$i$i$l$l$n$o$o$o$o$r$r$r$r$r$s$s$t$t$u$x$x$y$y
                                                • API String ID: 0-1389426690
                                                • Opcode ID: 6c52c70809327a56088b94180972d0ec2f26b9a01d5ece6e06692af3203bd157
                                                • Instruction ID: 736e9a2ff06c9903231fdc911306428f10f64ae89d11f3f6351f21f0fe3a524d
                                                • Opcode Fuzzy Hash: 6c52c70809327a56088b94180972d0ec2f26b9a01d5ece6e06692af3203bd157
                                                • Instruction Fuzzy Hash: 90D11D64A086E8CBEB21CB24CC487C9BB75AF55704F0450E9914CAB391D7BA4FC4CF2A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$E$G$H$L$L$L$L$M$P$W$W$W$a$a$a$a$a$b$b$c$d$d$d$d$e$e$e$e$i$i$i$l$l$n$o$o$o$o$r$r$r$r$r$s$s$t$t$u$x$x$y$y
                                                • API String ID: 0-1389426690
                                                • Opcode ID: 282d2022df174df892bc0fa8082b37abe8beab81664315bf64815537b9bee3b7
                                                • Instruction ID: 5a33921d472eb5b1d54932414b158a79c7060a2ea52495a653e6a93cb6c8b944
                                                • Opcode Fuzzy Hash: 282d2022df174df892bc0fa8082b37abe8beab81664315bf64815537b9bee3b7
                                                • Instruction Fuzzy Hash: 68C1E0749086E8CAEB21CB24CD447D9BAB5AF55708F0441E9914C7B391D7BA4FC4CF2A
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 544645111-215400123
                                                • Opcode ID: 6f1aed589faa056a0852ec4fa35efdb10074c7c864bb1c776dfdcc7162dddfda
                                                • Instruction ID: 680e258f425ee6c68fe86b2117ead666fda9975553f3b758cf5b8f653f7fc27b
                                                • Opcode Fuzzy Hash: 6f1aed589faa056a0852ec4fa35efdb10074c7c864bb1c776dfdcc7162dddfda
                                                • Instruction Fuzzy Hash: E6222BB4E042A98BDB24CB14C984BE9BBB1AF44304F1081E9E548BB781D7755FC1CF59
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 544645111-215400123
                                                • Opcode ID: f7c28a94e09f94054dd5d783e1d24e2702e967a16eb50db53d6b77a3e3e9e812
                                                • Instruction ID: 9b5f17017330220ca9fff1c45d645742c72bd43d93c1bf5158f13f9b32c0fa46
                                                • Opcode Fuzzy Hash: f7c28a94e09f94054dd5d783e1d24e2702e967a16eb50db53d6b77a3e3e9e812
                                                • Instruction Fuzzy Hash: A81205B4A042A88BDB24CB18C984BEDBBB1AF54314F1045EAE459BB381D7795FC1CF19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: 331e01e38dd0f510206513c9ea5a78eff6aa6bc09356ec22b1eb7b402da7404d
                                                • Instruction ID: 2adf2b18feb625bed8cfcb78b62098ecdcb4c0a0e1b3b05bb58cff684be47f1c
                                                • Opcode Fuzzy Hash: 331e01e38dd0f510206513c9ea5a78eff6aa6bc09356ec22b1eb7b402da7404d
                                                • Instruction Fuzzy Hash: 7CE104B4A042A88BDB25CB24C948BD9BBB1BF54714F1051EAE04DBB381D7794F85CF1A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: 7f62187aef5625279c27ea7d94b2c2c094b0ce3406f1ae28e1879990c4459e22
                                                • Instruction ID: 1df6281eaa33ee93b9c615ee13f399540a00456e0d95a1d980fabfb698b6a851
                                                • Opcode Fuzzy Hash: 7f62187aef5625279c27ea7d94b2c2c094b0ce3406f1ae28e1879990c4459e22
                                                • Instruction Fuzzy Hash: 27A1C3B4A082A88BDB21CB28CD447D9BBB1AF55704F1041E9E14CBB381D7794F85CF5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: dcdebe5f72c0ccc379f0a9a28b8152a2cbb9d2d85e5b684ba006bc1f1b1b4051
                                                • Instruction ID: dd75d956de814c05ae4584f52afdb768220d78640f5e590803b18e4e1626968d
                                                • Opcode Fuzzy Hash: dcdebe5f72c0ccc379f0a9a28b8152a2cbb9d2d85e5b684ba006bc1f1b1b4051
                                                • Instruction Fuzzy Hash: 3891C2B4A082A88BDB218B28C9487D9BBB1AF55704F1045E9E14CBB381D7794F85CF5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: 3ee205ec0df50246e207656a30364f65ceff2ff80cf25e697aceff67b9a198bf
                                                • Instruction ID: 0a7123dfe8a5327e98d8b2165b2be4c7d76cd1d813a51559d9bb141b6610bf7c
                                                • Opcode Fuzzy Hash: 3ee205ec0df50246e207656a30364f65ceff2ff80cf25e697aceff67b9a198bf
                                                • Instruction Fuzzy Hash: 2E91C3B4A082A8CBDB218B28C9447D9BBB1AF55704F1045E9E14CBB381D77A4F85CF5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: 80adb4852b0960b0d3162291facd05290ea9be920a23199fe1d5f1715aae6800
                                                • Instruction ID: 8002ac30c2fbda6335aa2e2110aad2d2e01338a9879cba067224349d9c433c38
                                                • Opcode Fuzzy Hash: 80adb4852b0960b0d3162291facd05290ea9be920a23199fe1d5f1715aae6800
                                                • Instruction Fuzzy Hash: 2481C6B4A082A8CBDB21CB24CD447D9BBB5AB55704F0045E9A14CAB381C7B94F85CF5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 0-215400123
                                                • Opcode ID: e80f974e5b24f2e604f31b36c1f62663b58aceb74e947806e38518b29f20a73d
                                                • Instruction ID: 42eea9e0e97cf5b612de837b8b02b13f81132edb7b819d993aa0766d76aa8ddb
                                                • Opcode Fuzzy Hash: e80f974e5b24f2e604f31b36c1f62663b58aceb74e947806e38518b29f20a73d
                                                • Instruction Fuzzy Hash: 6171C8B49082A8CBEB21CB24CD447D9BAB5AF15704F1045E9E14CBB381C7BA4F85CF5A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2143 407c9a-4080fd 2145 408142-408154 2143->2145 2146 4080ff-40813d 2143->2146 2148 408156-408162 2145->2148 2149 408167-408171 2145->2149 2147 40861c-40864d VirtualProtect 2146->2147 2151 408686-408794 2147->2151 2152 40864f-408681 2147->2152 2148->2147 2153 408799-408964 2151->2153 2152->2153 2157 4089a4-4089ef 2153->2157 2158 408966-40899f 2153->2158 2159 4089f1-408a2a 2157->2159 2160 408a2f-408a35 2157->2160 2161 408d30-408d34 2158->2161 2159->2161 2162 408a3b-408ac2 2160->2162 2163 408d3a-408f89 2161->2163 2164 4099cb-409ac2 2161->2164 2167 408ac6-408bb6 2162->2167 2168 408f8b-408fc7 2163->2168 2169 408fcc-409017 2163->2169 2165 409b02-409b4d 2164->2165 2166 409ac4-409afd 2164->2166 2173 409b8d-409b93 2165->2173 2174 409b4f-409b88 2165->2174 2172 409e8e-409f47 2166->2172 2175 408bb8-408bc8 2167->2175 2176 408bcd-408bd7 2167->2176 2177 409361-409368 2168->2177 2170 409019-409055 2169->2170 2171 40905a-409060 2169->2171 2170->2177 2180 409066-4090ed 2171->2180 2181 409f49-409f87 2172->2181 2182 409f8c-409f9e 2172->2182 2183 409b99-409c20 2173->2183 2174->2172 2184 408c50-408c57 2175->2184 2176->2167 2185 408bdd-408bea 2176->2185 2178 40936a-4093a6 2177->2178 2179 4093ab-409403 2177->2179 2186 40a472-40a477 ExitProcess 2178->2186 2187 409405-409443 2179->2187 2188 409448-40945a 2179->2188 2191 4090f1-4091e1 2180->2191 2192 40a466-40a46c 2181->2192 2193 409fa0-409fac 2182->2193 2194 409fb1-40a002 2182->2194 2195 409c24-409d14 2183->2195 2189 408c99-408ce5 2184->2189 2190 408c59-408c94 2184->2190 2185->2167 2196 408bf0-408c2c 2185->2196 2197 409922-409929 2187->2197 2198 40945c-409468 2188->2198 2199 40946d-4094be 2188->2199 2200 408cf7-408d29 2189->2200 2201 408ce7-408cf1 2189->2201 2190->2161 2202 4091e3-4091f3 2191->2202 2203 4091f8-409202 2191->2203 2192->2186 2193->2192 2206 40a004-40a042 2194->2206 2207 40a047-40a088 2194->2207 2204 409d16-409d26 2195->2204 2205 409d2b-409d35 2195->2205 2208 408c3a 2196->2208 2209 408c2e-408c38 2196->2209 2197->2164 2213 40992f-409988 2197->2213 2198->2197 2214 4094c0-4094fe 2199->2214 2215 409503-409544 2199->2215 2200->2161 2201->2162 2201->2200 2218 40927b-409282 2202->2218 2203->2191 2219 409208-409215 2203->2219 2216 409dae-409db5 2204->2216 2205->2195 2217 409d3b-409d48 2205->2217 2206->2192 2211 40a08a-40a0c8 2207->2211 2212 40a0cd-40a191 2207->2212 2210 408c44-408c4a 2208->2210 2209->2210 2210->2184 2211->2192 2237 40a197-40a26e 2212->2237 2238 40a45a-40a460 2212->2238 2213->2164 2242 40998a-4099c6 2213->2242 2214->2197 2224 409546-409584 2215->2224 2225 409589-40964d 2215->2225 2222 409df7-409e43 2216->2222 2223 409db7-409df2 2216->2223 2217->2195 2220 409d4e-409d8a 2217->2220 2227 409284-4092c2 2218->2227 2228 4092c7-409313 2218->2228 2219->2191 2226 40921b-409257 2219->2226 2233 409d98 2220->2233 2234 409d8c-409d96 2220->2234 2235 409e55-409e87 2222->2235 2236 409e45-409e4f 2222->2236 2223->2172 2224->2197 2243 409653-40972a 2225->2243 2244 409916-40991c 2225->2244 2239 409265 2226->2239 2240 409259-409263 2226->2240 2227->2177 2229 409325-409357 2228->2229 2230 409315-40931f 2228->2230 2229->2177 2230->2180 2230->2229 2241 409da2-409da8 2233->2241 2234->2241 2235->2172 2236->2183 2236->2235 2245 40a279-40a287 2237->2245 2238->2192 2246 40926f-409275 2239->2246 2240->2246 2241->2216 2242->2186 2247 409735-409743 2243->2247 2244->2197 2248 40a315-40a360 2245->2248 2249 40a28d-40a29a 2245->2249 2246->2218 2252 4097d1-40981c 2247->2252 2253 409749-409756 2247->2253 2250 40a371-40a3c2 2248->2250 2251 40a362-40a36c 2248->2251 2249->2248 2254 40a29c-40a2e7 2249->2254 2256 40a3d0-40a402 2250->2256 2257 40a3c4-40a3ce 2250->2257 2255 40a40c-40a413 2251->2255 2259 40982d-40987e 2252->2259 2260 40981e-409828 2252->2260 2253->2252 2258 409758-4097a3 2253->2258 2261 40a307 2254->2261 2262 40a2e9-40a305 2254->2262 2264 40a455 2255->2264 2265 40a415-40a453 2255->2265 2256->2255 2257->2255 2269 4097c3 2258->2269 2270 4097a5-4097c1 2258->2270 2267 409880-40988a 2259->2267 2268 40988c-4098be 2259->2268 2266 4098c8-4098cf 2260->2266 2261->2245 2262->2261 2271 40a30e 2262->2271 2264->2238 2265->2192 2274 409911 2266->2274 2275 4098d1-40990f 2266->2275 2267->2266 2268->2266 2269->2247 2270->2269 2272 4097ca 2270->2272 2271->2248 2272->2252 2274->2244 2275->2197
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 544645111-215400123
                                                • Opcode ID: d0b0a7fe9d406b5fe98e0eefc5c2cdd973b16e86ce0152bcd6a534d4b6762cda
                                                • Instruction ID: ec2d891c00d131031af488a7aeab7433c2fa4461e8dab624ac9fccc522e3d025
                                                • Opcode Fuzzy Hash: d0b0a7fe9d406b5fe98e0eefc5c2cdd973b16e86ce0152bcd6a534d4b6762cda
                                                • Instruction Fuzzy Hash: 7871C9B49082A8CBEB21CB24CD447D9BAB5AF15704F1045E9D14CBB381C77A4F85CF1A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2276 4085bd-4085c9 2277 40860b-408616 2276->2277 2278 4085cb-408609 2276->2278 2279 40861c-40864d VirtualProtect 2277->2279 2278->2279 2282 408686-4086f7 2279->2282 2283 40864f-408681 2279->2283 2285 40872f-408794 2282->2285 2284 408799-408964 2283->2284 2288 4089a4-4089ef 2284->2288 2289 408966-40899f 2284->2289 2285->2284 2290 4089f1-408a2a 2288->2290 2291 408a2f-408a35 2288->2291 2292 408d30-408d34 2289->2292 2290->2292 2293 408a3b-408ac2 2291->2293 2294 408d3a-408f89 2292->2294 2295 4099cb-409ac2 2292->2295 2298 408ac6-408bb6 2293->2298 2299 408f8b-408fc7 2294->2299 2300 408fcc-409017 2294->2300 2296 409b02-409b4d 2295->2296 2297 409ac4-409afd 2295->2297 2304 409b8d-409b93 2296->2304 2305 409b4f-409b88 2296->2305 2303 409e8e-409f47 2297->2303 2306 408bb8-408bc8 2298->2306 2307 408bcd-408bd7 2298->2307 2308 409361-409368 2299->2308 2301 409019-409055 2300->2301 2302 40905a-409060 2300->2302 2301->2308 2311 409066-4090ed 2302->2311 2312 409f49-409f87 2303->2312 2313 409f8c-409f9e 2303->2313 2314 409b99-409c20 2304->2314 2305->2303 2315 408c50-408c57 2306->2315 2307->2298 2316 408bdd-408bea 2307->2316 2309 40936a-4093a6 2308->2309 2310 4093ab-409403 2308->2310 2317 40a472-40a477 ExitProcess 2309->2317 2318 409405-409443 2310->2318 2319 409448-40945a 2310->2319 2322 4090f1-4091e1 2311->2322 2323 40a466-40a46c 2312->2323 2324 409fa0-409fac 2313->2324 2325 409fb1-40a002 2313->2325 2326 409c24-409d14 2314->2326 2320 408c99-408ce5 2315->2320 2321 408c59-408c94 2315->2321 2316->2298 2327 408bf0-408c2c 2316->2327 2328 409922-409929 2318->2328 2329 40945c-409468 2319->2329 2330 40946d-4094be 2319->2330 2331 408cf7-408d29 2320->2331 2332 408ce7-408cf1 2320->2332 2321->2292 2333 4091e3-4091f3 2322->2333 2334 4091f8-409202 2322->2334 2323->2317 2324->2323 2337 40a004-40a042 2325->2337 2338 40a047-40a088 2325->2338 2335 409d16-409d26 2326->2335 2336 409d2b-409d35 2326->2336 2339 408c3a 2327->2339 2340 408c2e-408c38 2327->2340 2328->2295 2344 40992f-409988 2328->2344 2329->2328 2345 4094c0-4094fe 2330->2345 2346 409503-409544 2330->2346 2331->2292 2332->2293 2332->2331 2349 40927b-409282 2333->2349 2334->2322 2350 409208-409215 2334->2350 2347 409dae-409db5 2335->2347 2336->2326 2348 409d3b-409d48 2336->2348 2337->2323 2342 40a08a-40a0c8 2338->2342 2343 40a0cd-40a191 2338->2343 2341 408c44-408c4a 2339->2341 2340->2341 2341->2315 2342->2323 2368 40a197-40a26e 2343->2368 2369 40a45a-40a460 2343->2369 2344->2295 2373 40998a-4099c6 2344->2373 2345->2328 2355 409546-409584 2346->2355 2356 409589-40964d 2346->2356 2353 409df7-409e43 2347->2353 2354 409db7-409df2 2347->2354 2348->2326 2351 409d4e-409d8a 2348->2351 2358 409284-4092c2 2349->2358 2359 4092c7-409313 2349->2359 2350->2322 2357 40921b-409257 2350->2357 2364 409d98 2351->2364 2365 409d8c-409d96 2351->2365 2366 409e55-409e87 2353->2366 2367 409e45-409e4f 2353->2367 2354->2303 2355->2328 2374 409653-40972a 2356->2374 2375 409916-40991c 2356->2375 2370 409265 2357->2370 2371 409259-409263 2357->2371 2358->2308 2360 409325-409357 2359->2360 2361 409315-40931f 2359->2361 2360->2308 2361->2311 2361->2360 2372 409da2-409da8 2364->2372 2365->2372 2366->2303 2367->2314 2367->2366 2376 40a279-40a287 2368->2376 2369->2323 2377 40926f-409275 2370->2377 2371->2377 2372->2347 2373->2317 2378 409735-409743 2374->2378 2375->2328 2379 40a315-40a360 2376->2379 2380 40a28d-40a29a 2376->2380 2377->2349 2383 4097d1-40981c 2378->2383 2384 409749-409756 2378->2384 2381 40a371-40a3c2 2379->2381 2382 40a362-40a36c 2379->2382 2380->2379 2385 40a29c-40a2e7 2380->2385 2387 40a3d0-40a402 2381->2387 2388 40a3c4-40a3ce 2381->2388 2386 40a40c-40a413 2382->2386 2390 40982d-40987e 2383->2390 2391 40981e-409828 2383->2391 2384->2383 2389 409758-4097a3 2384->2389 2392 40a307 2385->2392 2393 40a2e9-40a305 2385->2393 2395 40a455 2386->2395 2396 40a415-40a453 2386->2396 2387->2386 2388->2386 2400 4097c3 2389->2400 2401 4097a5-4097c1 2389->2401 2398 409880-40988a 2390->2398 2399 40988c-4098be 2390->2399 2397 4098c8-4098cf 2391->2397 2392->2376 2393->2392 2402 40a30e 2393->2402 2395->2369 2396->2323 2405 409911 2397->2405 2406 4098d1-40990f 2397->2406 2398->2397 2399->2397 2400->2378 2401->2400 2403 4097ca 2401->2403 2402->2379 2403->2383 2405->2375 2406->2328
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 544645111-215400123
                                                • Opcode ID: cd97989d0c3b1013a5e7116e7ab31a4db66f0d0539c0911fbc3551e6ae52f1fe
                                                • Instruction ID: 625d281dfe30ccee287b8e8f0ea624e1b992baa3afb4f701c74c0ff8d4e14b8f
                                                • Opcode Fuzzy Hash: cd97989d0c3b1013a5e7116e7ab31a4db66f0d0539c0911fbc3551e6ae52f1fe
                                                • Instruction Fuzzy Hash: 1161C8B49082A8CAEB21CB24CD447D9BAB5AF15704F0445E9D14CBB391C7BA4F85CF2A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2407 4080fe-40864d VirtualProtect 2410 408686-408794 2407->2410 2411 40864f-408681 2407->2411 2412 408799-408964 2410->2412 2411->2412 2416 4089a4-4089ef 2412->2416 2417 408966-40899f 2412->2417 2418 4089f1-408a2a 2416->2418 2419 408a2f-408a35 2416->2419 2420 408d30-408d34 2417->2420 2418->2420 2421 408a3b-408ac2 2419->2421 2422 408d3a-408f89 2420->2422 2423 4099cb-409ac2 2420->2423 2426 408ac6-408bb6 2421->2426 2427 408f8b-408fc7 2422->2427 2428 408fcc-409017 2422->2428 2424 409b02-409b4d 2423->2424 2425 409ac4-409afd 2423->2425 2432 409b8d-409b93 2424->2432 2433 409b4f-409b88 2424->2433 2431 409e8e-409f47 2425->2431 2434 408bb8-408bc8 2426->2434 2435 408bcd-408bd7 2426->2435 2436 409361-409368 2427->2436 2429 409019-409055 2428->2429 2430 40905a-409060 2428->2430 2429->2436 2439 409066-4090ed 2430->2439 2440 409f49-409f87 2431->2440 2441 409f8c-409f9e 2431->2441 2442 409b99-409c20 2432->2442 2433->2431 2443 408c50-408c57 2434->2443 2435->2426 2444 408bdd-408bea 2435->2444 2437 40936a-4093a6 2436->2437 2438 4093ab-409403 2436->2438 2445 40a472-40a477 ExitProcess 2437->2445 2446 409405-409443 2438->2446 2447 409448-40945a 2438->2447 2450 4090f1-4091e1 2439->2450 2451 40a466-40a46c 2440->2451 2452 409fa0-409fac 2441->2452 2453 409fb1-40a002 2441->2453 2454 409c24-409d14 2442->2454 2448 408c99-408ce5 2443->2448 2449 408c59-408c94 2443->2449 2444->2426 2455 408bf0-408c2c 2444->2455 2456 409922-409929 2446->2456 2457 40945c-409468 2447->2457 2458 40946d-4094be 2447->2458 2459 408cf7-408d29 2448->2459 2460 408ce7-408cf1 2448->2460 2449->2420 2461 4091e3-4091f3 2450->2461 2462 4091f8-409202 2450->2462 2451->2445 2452->2451 2465 40a004-40a042 2453->2465 2466 40a047-40a088 2453->2466 2463 409d16-409d26 2454->2463 2464 409d2b-409d35 2454->2464 2467 408c3a 2455->2467 2468 408c2e-408c38 2455->2468 2456->2423 2472 40992f-409988 2456->2472 2457->2456 2473 4094c0-4094fe 2458->2473 2474 409503-409544 2458->2474 2459->2420 2460->2421 2460->2459 2477 40927b-409282 2461->2477 2462->2450 2478 409208-409215 2462->2478 2475 409dae-409db5 2463->2475 2464->2454 2476 409d3b-409d48 2464->2476 2465->2451 2470 40a08a-40a0c8 2466->2470 2471 40a0cd-40a191 2466->2471 2469 408c44-408c4a 2467->2469 2468->2469 2469->2443 2470->2451 2496 40a197-40a26e 2471->2496 2497 40a45a-40a460 2471->2497 2472->2423 2501 40998a-4099c6 2472->2501 2473->2456 2483 409546-409584 2474->2483 2484 409589-40964d 2474->2484 2481 409df7-409e43 2475->2481 2482 409db7-409df2 2475->2482 2476->2454 2479 409d4e-409d8a 2476->2479 2486 409284-4092c2 2477->2486 2487 4092c7-409313 2477->2487 2478->2450 2485 40921b-409257 2478->2485 2492 409d98 2479->2492 2493 409d8c-409d96 2479->2493 2494 409e55-409e87 2481->2494 2495 409e45-409e4f 2481->2495 2482->2431 2483->2456 2502 409653-40972a 2484->2502 2503 409916-40991c 2484->2503 2498 409265 2485->2498 2499 409259-409263 2485->2499 2486->2436 2488 409325-409357 2487->2488 2489 409315-40931f 2487->2489 2488->2436 2489->2439 2489->2488 2500 409da2-409da8 2492->2500 2493->2500 2494->2431 2495->2442 2495->2494 2504 40a279-40a287 2496->2504 2497->2451 2505 40926f-409275 2498->2505 2499->2505 2500->2475 2501->2445 2506 409735-409743 2502->2506 2503->2456 2507 40a315-40a360 2504->2507 2508 40a28d-40a29a 2504->2508 2505->2477 2511 4097d1-40981c 2506->2511 2512 409749-409756 2506->2512 2509 40a371-40a3c2 2507->2509 2510 40a362-40a36c 2507->2510 2508->2507 2513 40a29c-40a2e7 2508->2513 2515 40a3d0-40a402 2509->2515 2516 40a3c4-40a3ce 2509->2516 2514 40a40c-40a413 2510->2514 2518 40982d-40987e 2511->2518 2519 40981e-409828 2511->2519 2512->2511 2517 409758-4097a3 2512->2517 2520 40a307 2513->2520 2521 40a2e9-40a305 2513->2521 2523 40a455 2514->2523 2524 40a415-40a453 2514->2524 2515->2514 2516->2514 2528 4097c3 2517->2528 2529 4097a5-4097c1 2517->2529 2526 409880-40988a 2518->2526 2527 40988c-4098be 2518->2527 2525 4098c8-4098cf 2519->2525 2520->2504 2521->2520 2530 40a30e 2521->2530 2523->2497 2524->2451 2533 409911 2525->2533 2534 4098d1-40990f 2525->2534 2526->2525 2527->2525 2528->2506 2529->2528 2531 4097ca 2529->2531 2530->2507 2531->2511 2533->2503 2534->2456
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                • API String ID: 544645111-215400123
                                                • Opcode ID: 26e8d5b9a9d3ffa4bebdb6377f811e48dd6436d8b2e435224c717ff429529648
                                                • Instruction ID: 376e2767f3cf7e469c955a49fa83cff2aaf57e068d71da198fb35e287fd87543
                                                • Opcode Fuzzy Hash: 26e8d5b9a9d3ffa4bebdb6377f811e48dd6436d8b2e435224c717ff429529648
                                                • Instruction Fuzzy Hash: F661DBB49082A8CBEB21CB24CD447D9BAB5AF55704F1445E9914CBB381D7BA4FC4CF2A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2535 409a07-409ac2 2536 409b02-409b4d 2535->2536 2537 409ac4-409afd 2535->2537 2539 409b8d-409b93 2536->2539 2540 409b4f-409b88 2536->2540 2538 409e8e-409f47 2537->2538 2541 409f49-409f87 2538->2541 2542 409f8c-409f9e 2538->2542 2543 409b99-409c20 2539->2543 2540->2538 2544 40a466-40a477 ExitProcess 2541->2544 2545 409fa0-409fac 2542->2545 2546 409fb1-40a002 2542->2546 2547 409c24-409d14 2543->2547 2545->2544 2551 40a004-40a042 2546->2551 2552 40a047-40a088 2546->2552 2549 409d16-409d26 2547->2549 2550 409d2b-409d35 2547->2550 2556 409dae-409db5 2549->2556 2550->2547 2553 409d3b-409d48 2550->2553 2551->2544 2554 40a08a-40a0c8 2552->2554 2555 40a0cd-40a191 2552->2555 2553->2547 2557 409d4e-409d8a 2553->2557 2554->2544 2565 40a197-40a26e 2555->2565 2566 40a45a-40a460 2555->2566 2559 409df7-409e43 2556->2559 2560 409db7-409df2 2556->2560 2561 409d98 2557->2561 2562 409d8c-409d96 2557->2562 2563 409e55-409e87 2559->2563 2564 409e45-409e4f 2559->2564 2560->2538 2567 409da2-409da8 2561->2567 2562->2567 2563->2538 2564->2543 2564->2563 2568 40a279-40a287 2565->2568 2566->2544 2567->2556 2569 40a315-40a360 2568->2569 2570 40a28d-40a29a 2568->2570 2571 40a371-40a3c2 2569->2571 2572 40a362-40a36c 2569->2572 2570->2569 2573 40a29c-40a2e7 2570->2573 2575 40a3d0-40a402 2571->2575 2576 40a3c4-40a3ce 2571->2576 2574 40a40c-40a413 2572->2574 2577 40a307 2573->2577 2578 40a2e9-40a305 2573->2578 2580 40a455 2574->2580 2581 40a415-40a453 2574->2581 2575->2574 2576->2574 2577->2568 2578->2577 2582 40a30e 2578->2582 2580->2566 2581->2544 2582->2569
                                                APIs
                                                • ExitProcess.KERNEL32(DEADBEEF), ref: 0040A477
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExitProcess
                                                • String ID:
                                                • API String ID: 621844428-0
                                                • Opcode ID: 72a79fb50813daf9641634454f6812f554216fd05c69cff620f9039262b24773
                                                • Instruction ID: c008a3a88fbbd9c5b9f150bc327e9043af79050cbe7d05808c07bc7f694a12f5
                                                • Opcode Fuzzy Hash: 72a79fb50813daf9641634454f6812f554216fd05c69cff620f9039262b24773
                                                • Instruction Fuzzy Hash: 20D1F7B4A042A88BCB64CF54C984BEDBBB1BB44315F2086EAE459B7751D7349EC1CF09

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2583 4097d3-40981c 2584 40982d-40987e 2583->2584 2585 40981e-409828 2583->2585 2587 409880-40988a 2584->2587 2588 40988c-4098be 2584->2588 2586 4098c8-4098cf 2585->2586 2589 409911-40991c 2586->2589 2590 4098d1-40990f 2586->2590 2587->2586 2588->2586 2591 409922-409929 2589->2591 2590->2591 2592 4099cb-409ac2 2591->2592 2593 40992f-409988 2591->2593 2595 409b02-409b4d 2592->2595 2596 409ac4-409afd 2592->2596 2593->2592 2601 40998a-4099c6 2593->2601 2599 409b8d-409b93 2595->2599 2600 409b4f-409b88 2595->2600 2598 409e8e-409f47 2596->2598 2602 409f49-409f87 2598->2602 2603 409f8c-409f9e 2598->2603 2604 409b99-409c20 2599->2604 2600->2598 2605 40a472-40a477 ExitProcess 2601->2605 2606 40a466-40a46c 2602->2606 2607 409fa0-409fac 2603->2607 2608 409fb1-40a002 2603->2608 2609 409c24-409d14 2604->2609 2606->2605 2607->2606 2612 40a004-40a042 2608->2612 2613 40a047-40a088 2608->2613 2610 409d16-409d26 2609->2610 2611 409d2b-409d35 2609->2611 2617 409dae-409db5 2610->2617 2611->2609 2614 409d3b-409d48 2611->2614 2612->2606 2615 40a08a-40a0c8 2613->2615 2616 40a0cd-40a191 2613->2616 2614->2609 2618 409d4e-409d8a 2614->2618 2615->2606 2626 40a197-40a26e 2616->2626 2627 40a45a-40a460 2616->2627 2620 409df7-409e43 2617->2620 2621 409db7-409df2 2617->2621 2622 409d98 2618->2622 2623 409d8c-409d96 2618->2623 2624 409e55-409e87 2620->2624 2625 409e45-409e4f 2620->2625 2621->2598 2628 409da2-409da8 2622->2628 2623->2628 2624->2598 2625->2604 2625->2624 2629 40a279-40a287 2626->2629 2627->2606 2628->2617 2630 40a315-40a360 2629->2630 2631 40a28d-40a29a 2629->2631 2632 40a371-40a3c2 2630->2632 2633 40a362-40a36c 2630->2633 2631->2630 2634 40a29c-40a2e7 2631->2634 2636 40a3d0-40a402 2632->2636 2637 40a3c4-40a3ce 2632->2637 2635 40a40c-40a413 2633->2635 2638 40a307 2634->2638 2639 40a2e9-40a305 2634->2639 2641 40a455 2635->2641 2642 40a415-40a453 2635->2642 2636->2635 2637->2635 2638->2629 2639->2638 2643 40a30e 2639->2643 2641->2627 2642->2606 2643->2630
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: df21ca10aed49071c5b6b2f28568336d275df7644821752aeb7a37ebf4f4b97c
                                                • Instruction ID: 8814cd1c3c061a6c33971eeb85ef7a85a703eda32cd3c751a69f55dd44878a16
                                                • Opcode Fuzzy Hash: df21ca10aed49071c5b6b2f28568336d275df7644821752aeb7a37ebf4f4b97c
                                                • Instruction Fuzzy Hash: 1801A9F49046A98FCB248B54CD88BDDBBB4BB05305F1442EAD519B7741D7345E85CF09

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2644 409429-409929 2646 4099cb-409ac2 2644->2646 2647 40992f-409988 2644->2647 2648 409b02-409b4d 2646->2648 2649 409ac4-409afd 2646->2649 2647->2646 2654 40998a-4099c6 2647->2654 2652 409b8d-409b93 2648->2652 2653 409b4f-409b88 2648->2653 2651 409e8e-409f47 2649->2651 2655 409f49-409f87 2651->2655 2656 409f8c-409f9e 2651->2656 2657 409b99-409c20 2652->2657 2653->2651 2658 40a472-40a477 ExitProcess 2654->2658 2659 40a466-40a46c 2655->2659 2660 409fa0-409fac 2656->2660 2661 409fb1-40a002 2656->2661 2662 409c24-409d14 2657->2662 2659->2658 2660->2659 2665 40a004-40a042 2661->2665 2666 40a047-40a088 2661->2666 2663 409d16-409d26 2662->2663 2664 409d2b-409d35 2662->2664 2670 409dae-409db5 2663->2670 2664->2662 2667 409d3b-409d48 2664->2667 2665->2659 2668 40a08a-40a0c8 2666->2668 2669 40a0cd-40a191 2666->2669 2667->2662 2671 409d4e-409d8a 2667->2671 2668->2659 2679 40a197-40a26e 2669->2679 2680 40a45a-40a460 2669->2680 2673 409df7-409e43 2670->2673 2674 409db7-409df2 2670->2674 2675 409d98 2671->2675 2676 409d8c-409d96 2671->2676 2677 409e55-409e87 2673->2677 2678 409e45-409e4f 2673->2678 2674->2651 2681 409da2-409da8 2675->2681 2676->2681 2677->2651 2678->2657 2678->2677 2682 40a279-40a287 2679->2682 2680->2659 2681->2670 2683 40a315-40a360 2682->2683 2684 40a28d-40a29a 2682->2684 2685 40a371-40a3c2 2683->2685 2686 40a362-40a36c 2683->2686 2684->2683 2687 40a29c-40a2e7 2684->2687 2689 40a3d0-40a402 2685->2689 2690 40a3c4-40a3ce 2685->2690 2688 40a40c-40a413 2686->2688 2691 40a307 2687->2691 2692 40a2e9-40a305 2687->2692 2694 40a455 2688->2694 2695 40a415-40a453 2688->2695 2689->2688 2690->2688 2691->2682 2692->2691 2696 40a30e 2692->2696 2694->2680 2695->2659 2696->2683
                                                APIs
                                                • ExitProcess.KERNEL32(DEADBEEF), ref: 0040A477
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExitProcess
                                                • String ID:
                                                • API String ID: 621844428-0
                                                • Opcode ID: 65f52e8dd54f9a268cfcf699dfda5c29f93e292edebcae2cc65d72117e3ed62b
                                                • Instruction ID: 83806e5cf736b1ee28465a3577a62dddcaab2ffde1162d51884bde53348236b6
                                                • Opcode Fuzzy Hash: 65f52e8dd54f9a268cfcf699dfda5c29f93e292edebcae2cc65d72117e3ed62b
                                                • Instruction Fuzzy Hash: 3FF0B2F8A042A88FCB248F14CC88BD9BB74BB04309F0445EAE11AB7381D7349E85CF09

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2982 411f70-411fcd 2983 411fd3-411fe2 OpenProcessToken 2982->2983 2984 4121c9 2982->2984 2985 411fe4-411fea GetLastError 2983->2985 2986 411fef-412009 DuplicateTokenEx 2983->2986 2987 4121cb-4121db call 413f30 2984->2987 2988 41216b-412170 2985->2988 2989 412016-41203b AllocateAndInitializeSid 2986->2989 2990 41200b-412011 GetLastError 2986->2990 2993 412172-412173 CloseHandle 2988->2993 2994 412179-41217e 2988->2994 2995 412048-41206c CreateWellKnownSid 2989->2995 2996 41203d-412043 GetLastError 2989->2996 2990->2988 2993->2994 2997 412180-412181 CloseHandle 2994->2997 2998 412187-41218c 2994->2998 2999 4120e5-412103 CreateRestrictedToken 2995->2999 3000 41206e-412077 GetLastError 2995->3000 2996->2988 2997->2998 3003 412195-412197 2998->3003 3004 41218e-41218f FreeSid 2998->3004 3005 412105-41210b GetLastError 2999->3005 3006 41210d-412132 AllocateAndInitializeSid 2999->3006 3001 412079-41207c 3000->3001 3002 41207e-412083 3000->3002 3001->2999 3001->3002 3002->2988 3007 412089-41209d GetProcessHeap HeapAlloc 3002->3007 3008 4121a9-4121ae 3003->3008 3009 412199-4121a3 GetProcessHeap HeapFree 3003->3009 3004->3003 3005->2988 3010 412134-41213a GetLastError 3006->3010 3011 41213c-41215c SetTokenInformation 3006->3011 3012 4120aa-4120c9 call 414e2c CreateWellKnownSid 3007->3012 3013 41209f-4120a5 GetLastError 3007->3013 3014 4121b0-4121b1 FreeSid 3008->3014 3015 4121b7-4121bc 3008->3015 3009->3008 3010->2988 3016 412166 3011->3016 3017 41215e-412164 GetLastError 3011->3017 3022 4120d6-4120de 3012->3022 3023 4120cb-4120d1 GetLastError 3012->3023 3013->2988 3014->3015 3015->2987 3019 4121be-4121c0 3015->3019 3016->2988 3017->2988 3019->2987 3021 4121c2-4121c3 CloseHandle 3019->3021 3021->2984 3022->2999 3023->2988
                                                APIs
                                                • OpenProcessToken.ADVAPI32(00000000,00000002,00000000,00000000), ref: 00411FDA
                                                • GetLastError.KERNEL32 ref: 00411FE4
                                                • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000002,00000002,00000000), ref: 00412001
                                                • GetLastError.KERNEL32 ref: 0041200B
                                                • CloseHandle.KERNEL32(00000000), ref: 00412173
                                                • CloseHandle.KERNEL32(00000000), ref: 00412181
                                                • FreeSid.ADVAPI32(00000000), ref: 0041218F
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041219C
                                                • HeapFree.KERNEL32(00000000), ref: 004121A3
                                                • FreeSid.ADVAPI32(?), ref: 004121B1
                                                • CloseHandle.KERNEL32(00000000), ref: 004121C3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CloseFreeHandle$ErrorHeapLastProcessToken$DuplicateOpen
                                                • String ID:
                                                • API String ID: 1790262672-3916222277
                                                • Opcode ID: 3f1a59d8f73edaad4b434cf73b553cf54cd56f2ab1023acbd563036531d9d7d6
                                                • Instruction ID: a903014ab0d868ded00178ac02ce73e7f8232d77ebbf52772378c1a350528e59
                                                • Opcode Fuzzy Hash: 3f1a59d8f73edaad4b434cf73b553cf54cd56f2ab1023acbd563036531d9d7d6
                                                • Instruction Fuzzy Hash: 1761D170A40208BBEB14DFA1DD59BEE7B78AB08B01F144125FA01F6290D7B89E558B69
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,00429070,000007CF,00000000,00000000), ref: 0040D852
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,0042A010,0000001A,00000000,00429070,0042906E,00429070,0042906E), ref: 0040D946
                                                • GetProcessHeap.KERNEL32(00000000,00000004), ref: 0040D9CD
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040D9D4
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000024,00000000), ref: 0040DA19
                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 0040DA38
                                                • GetProcessHeap.KERNEL32(00000000,00000026), ref: 0040DA7C
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040DA83
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Heap$AllocFolderPathProcessSpecial$DirectoryFileModuleNameWindows
                                                • String ID: $$\
                                                • API String ID: 2560937269-1395706711
                                                • Opcode ID: c2cb07e2c611a4aaa378541a72539b26cc0aaaf703b57eb2e97274b412ec1d77
                                                • Instruction ID: 06cb1b4999db3c3cde009c85b0b3182518ded17d7e086e67de86218526070a2f
                                                • Opcode Fuzzy Hash: c2cb07e2c611a4aaa378541a72539b26cc0aaaf703b57eb2e97274b412ec1d77
                                                • Instruction Fuzzy Hash: FE713371B002049BDB20AFA8DD45BAA7365EB48704F8445BBE906EB2D0D77C9E49CB4D
                                                APIs
                                                • CoInitializeEx.OLE32(00000000,00000000,00000000,?), ref: 00411A8F
                                                • CoUninitialize.OLE32 ref: 00411ACF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: InitializeUninitialize
                                                • String ID: ROOT\CIMV2
                                                • API String ID: 3442037557-2786109267
                                                • Opcode ID: 7154ad24f0ce045c8ebfdc6c4ce43aeb2f04787b459809e6e5fcd4b27f8df5be
                                                • Instruction ID: 6ab19ea00e4a884013ecfa3ee51ab5763124654a81a6a4930a193ff57cc8d813
                                                • Opcode Fuzzy Hash: 7154ad24f0ce045c8ebfdc6c4ce43aeb2f04787b459809e6e5fcd4b27f8df5be
                                                • Instruction Fuzzy Hash: E451C671B41205ABEB21DF64CC55F9ABBB4EF04744F10415AE909AB3D0DB79AD80CB98
                                                APIs
                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?), ref: 0040F17E
                                                • GetMappedFileNameW.PSAPI(00000000,?,?,?), ref: 0040F185
                                                • GetLogicalDriveStringsW.KERNEL32(00000103,?,?,?,?,?,?,?), ref: 0040F1DA
                                                • QueryDosDeviceW.KERNEL32(00000FA0,?,00000103,?,?,?,?,?,?), ref: 0040F214
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CurrentDeviceDriveFileLogicalMappedNameProcessQueryStrings
                                                • String ID:
                                                • API String ID: 1028133890-0
                                                • Opcode ID: 8032052f7ecf8c49a705a95394094d809a3f8ada2613e8f619425ca6245f0eb5
                                                • Instruction ID: 48b8bba606bf70ced818c55d0dde4bd3379a05982e34b3b01aafbcf70260f82a
                                                • Opcode Fuzzy Hash: 8032052f7ecf8c49a705a95394094d809a3f8ada2613e8f619425ca6245f0eb5
                                                • Instruction Fuzzy Hash: 9B51D479A002099BDB249F64DC557EA73B8FF44704F4440BEEC0AE7681EB359E45CB68
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000001C,00000000), ref: 004113F6
                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0041142F
                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00411478
                                                • CloseHandle.KERNEL32(00000000), ref: 00411483
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: e5b8cd542245b9e5d170e6a0bb264918fa009bff68f2b0f059f730a2013b970c
                                                • Instruction ID: ed6ce81f11c814b95676c3b144244a8704dff2a5250c1b87c862d7b63bcea838
                                                • Opcode Fuzzy Hash: e5b8cd542245b9e5d170e6a0bb264918fa009bff68f2b0f059f730a2013b970c
                                                • Instruction Fuzzy Hash: 0721B735601219ABCB20DF75DC98FEE73B8AF48704F0441AAF90997290DB389E85CA59
                                                APIs
                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00414A3E
                                                • IsDebuggerPresent.KERNEL32 ref: 00414B0A
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00414B2A
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00414B34
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                • String ID:
                                                • API String ID: 254469556-0
                                                • Opcode ID: eb54633653b1e7136daff6d8c49d900db8813ee08b08b0927fb5eae355787c96
                                                • Instruction ID: e027bf533add66c97cff3441150d370cccecafee1f68af7ea3ec92b8e2f9eeb7
                                                • Opcode Fuzzy Hash: eb54633653b1e7136daff6d8c49d900db8813ee08b08b0927fb5eae355787c96
                                                • Instruction Fuzzy Hash: A3311A75D4521CDBDB10DFA4D949BCDBBB8BF08704F1041AAE50DA7250EB749A848F49
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,?,00000000,00000000), ref: 0040DCB6
                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DC12,?), ref: 0040DCBD
                                                  • Part of subcall function 00412BD0: GetCurrentProcess.KERNEL32(?,?), ref: 00412C87
                                                  • Part of subcall function 00412BD0: IsWow64Process.KERNEL32(00000000), ref: 00412C8E
                                                  • Part of subcall function 00412BD0: RegGetValueW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,20010002,00000000,?,00000800), ref: 00412CED
                                                  • Part of subcall function 00412A50: SHGetKnownFolderPath.SHELL32(00419BA0,00000000,00000000,?), ref: 00412B08
                                                  • Part of subcall function 00412A50: CoTaskMemFree.OLE32(?), ref: 00412B43
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 0040DEE1
                                                • HeapFree.KERNEL32(00000000), ref: 0040DEE8
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: HeapProcess$Free$AllocCurrentFolderKnownPathTaskValueWow64
                                                • String ID:
                                                • API String ID: 296583963-0
                                                • Opcode ID: 72626ed7ebf942f3da3b4ff624644a62b2db256d44a538c0bd3af436bd098ac9
                                                • Instruction ID: 00c302652f448dc867151c1637c7350e428b9fb300c2f3923f77f2eb57857071
                                                • Opcode Fuzzy Hash: 72626ed7ebf942f3da3b4ff624644a62b2db256d44a538c0bd3af436bd098ac9
                                                • Instruction Fuzzy Hash: 86C1A071E002169BCF14DFA5D984BEEB7B5AF94304F04813AE812B73D1DB389958CB99
                                                APIs
                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00414867
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: FeaturePresentProcessor
                                                • String ID:
                                                • API String ID: 2325560087-0
                                                • Opcode ID: 85a69eae14f70fac69dded71679b64cec421971be0a92efe753145918f18106b
                                                • Instruction ID: 1fa32a7a9fe8101fc44ca39a3572bb05595d9e056a4a196d7830266f7ff49f08
                                                • Opcode Fuzzy Hash: 85a69eae14f70fac69dded71679b64cec421971be0a92efe753145918f18106b
                                                • Instruction Fuzzy Hash: 4A5128B1E102198FDB28CF65E9856ABBBF4FB88350F54847AD406EB350D378A941CB58
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(00414BC0,004144D5), ref: 00414BAB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 440e09a70d4185e5134bd87ad335f7482d09bb33f6763d4479a60e5079aa7941
                                                • Instruction ID: 190a85c4e36117c4851cde842c683295131adae64d9cec044f87a4c0bc670d8d
                                                • Opcode Fuzzy Hash: 440e09a70d4185e5134bd87ad335f7482d09bb33f6763d4479a60e5079aa7941
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 68eadc18075bdc65311dabbbd5e33a507b9c8c5ec6331530920b369572d2fcb4
                                                • Instruction ID: 856b991f6e70e0fb9ef2f4d066a2f33dcaea3df2205236e27f0407f8aebd5464
                                                • Opcode Fuzzy Hash: 68eadc18075bdc65311dabbbd5e33a507b9c8c5ec6331530920b369572d2fcb4
                                                • Instruction Fuzzy Hash: 0E52FE31E00249CECB2CDEBDC6E96DDFFB5AB84350F10E25B9089A7598C7315A469F60
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d7c172fee57f1ed6548c406c90953512d452ac45c9f20a0457aeeb3b1aa6324
                                                • Instruction ID: 82ae146b6ef45b9bf12d15841689aaa0a6ce40555f9a682480e8bc04d299ba44
                                                • Opcode Fuzzy Hash: 3d7c172fee57f1ed6548c406c90953512d452ac45c9f20a0457aeeb3b1aa6324
                                                • Instruction Fuzzy Hash: 7A71D231A01219CEDB2CDF78C7E9ADDFF75AB94210F10E19B9089A7598C7316F429E60
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54bafcd4f452923c6dd5c3b503312fcff292afa5b617bf38974f011cb8c44b16
                                                • Instruction ID: b7484dc350ae4b698d06df24e6f54f8242ce954ef6036649c6e2d9891a72fd00
                                                • Opcode Fuzzy Hash: 54bafcd4f452923c6dd5c3b503312fcff292afa5b617bf38974f011cb8c44b16
                                                • Instruction Fuzzy Hash: 6A710A32E00209CECB2CDEB9C6E99DDFF76BB94600F10E25F9095A7598C7356A429E50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2882 40d0b0-40d142 SetDllDirectoryW call 40eca0 call 414e2c VerSetConditionMask * 4 VerifyVersionInfoW 2887 40d144-40d14f GetLastError 2882->2887 2888 40d155-40d1b3 VerSetConditionMask * 2 VerifyVersionInfoW 2882->2888 2887->2888 2889 40d4dd-40d4f5 call 413f30 2887->2889 2888->2889 2890 40d1b9-40d20f call 412bd0 call 412a50 call 40d500 * 2 LoadLibraryExW GetCurrentProcess OpenProcessToken 2888->2890 2901 40d211-40d233 GetTokenInformation 2890->2901 2902 40d238-40d23e 2890->2902 2901->2902 2903 40d240-40d241 CloseHandle 2902->2903 2904 40d247-40d26f RegOpenKeyExW 2902->2904 2903->2904 2905 40d2e0 2904->2905 2906 40d271-40d2b4 RegGetValueW RegCloseKey 2904->2906 2908 40d2ea-40d2f0 2905->2908 2906->2905 2907 40d2b6-40d2bb 2906->2907 2909 40d2d4-40d2de 2907->2909 2910 40d2bd-40d2c2 2907->2910 2911 40d2f6-40d31d call 414e2c SHGetSpecialFolderPathA 2908->2911 2912 40d45a-40d470 call 40d830 call 40cc90 call 40db10 2908->2912 2909->2908 2910->2909 2914 40d2c4-40d2d2 2910->2914 2911->2912 2918 40d323-40d346 2911->2918 2926 40d472-40d481 GetModuleHandleW 2912->2926 2927 40d4c5-40d4da call 413f30 2912->2927 2914->2908 2923 40d348-40d354 2918->2923 2924 40d35b-40d3b9 CreateDirectoryA CreateFileA 2918->2924 2923->2924 2936 40d3bb-40d3c2 CloseHandle 2924->2936 2937 40d3cc-40d3f1 CreateFileA 2924->2937 2929 40d4c0 2926->2929 2930 40d483-40d49f GetProcAddress * 2 2926->2930 2929->2927 2930->2929 2933 40d4a1-40d4a3 2930->2933 2933->2929 2935 40d4a5-40d4be 2933->2935 2935->2929 2936->2937 2937->2912 2938 40d3f3-40d422 CreateSemaphoreW CreateEventW 2937->2938 2938->2912 2940 40d424-40d426 2938->2940 2940->2912 2941 40d428-40d447 CreateThread 2940->2941 2941->2912 2942 40d449-40d454 ResumeThread 2941->2942 2942->2912
                                                APIs
                                                • SetDllDirectoryW.KERNEL32(00419D44), ref: 0040D0D1
                                                • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003), ref: 0040D107
                                                • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000003), ref: 0040D113
                                                • VerSetConditionMask.KERNEL32(00000000,?,00000020,00000003,?,00000001,00000003), ref: 0040D11F
                                                • VerSetConditionMask.KERNEL32(00000000,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D12B
                                                • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 0040D13A
                                                • GetLastError.KERNEL32(?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D144
                                                • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D190
                                                • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D19C
                                                • VerifyVersionInfoW.KERNEL32(?,00000003,00000000), ref: 0040D1AB
                                                • LoadLibraryExW.KERNEL32(cryptnet.dll,00000000,00000800,SOFTWARE\Microsoft\Cryptography\Defaults\Provider,Image Path,SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv,Dll,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D1ED
                                                • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D200
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D207
                                                • GetTokenInformation.ADVAPI32(0000011C,00000014(TokenIntegrityLevel),?,00000004,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003), ref: 0040D22B
                                                • CloseHandle.KERNEL32(?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D241
                                                • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Policies\Zoom\Zoom Meetings\General,00000000,00020019,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003), ref: 0040D267
                                                • RegGetValueW.ADVAPI32(?,00000000,Disable3rdModuleVerify,0000FFFF,00000006,?,?,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D2A0
                                                • RegCloseKey.ADVAPI32(?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D2AC
                                                • SHGetSpecialFolderPathA.SHELL32(00000000,?,0000001C,00000000,?,?,?,00000118), ref: 0040D315
                                                • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D376
                                                • CreateFileA.KERNEL32(?,10000000,00000003,00000000,00000002,00000080,00000000), ref: 0040D3AB
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D3BC
                                                • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 0040D3E3
                                                • CreateSemaphoreW.KERNEL32(00000000,00000000,7FFFFFFF,00000000), ref: 0040D3FE
                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040D411
                                                • CreateThread.KERNEL32(00000000,00000000,0040EA50,00429068,00000004,00000000), ref: 0040D43A
                                                • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D454
                                                • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D477
                                                • GetProcAddress.KERNEL32(00000000,LdrRegisterDllNotification), ref: 0040D489
                                                • GetProcAddress.KERNEL32(00000000,LdrUnregisterDllNotification), ref: 0040D497
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ConditionCreateMask$CloseHandle$AddressDirectoryFileInfoOpenProcProcessThreadTokenVerifyVersion$CurrentErrorEventFolderInformationLastLibraryLoadModulePathResumeSemaphoreSpecialValue
                                                • String ID: Disable3rdModuleVerify$Dll$Image Path$LdrRegisterDllNotification$LdrUnregisterDllNotification$SOFTWARE\Microsoft\Cryptography\Defaults\Provider$SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv$SOFTWARE\Policies\Zoom\Zoom Meetings\General$ZoomVDI$\appsafecheck.txt$cryptnet.dll$ntdll.dll
                                                • API String ID: 695945955-2430632280
                                                • Opcode ID: e1f959e6f971e7319ddb763f41403bf31d78c8abb299f65c2b581fd2ccc26623
                                                • Instruction ID: e3f8eedf6af3ffbc4967407a62473a63f14479d3ec8d4df312e392e0d987a7e2
                                                • Opcode Fuzzy Hash: e1f959e6f971e7319ddb763f41403bf31d78c8abb299f65c2b581fd2ccc26623
                                                • Instruction Fuzzy Hash: F1B1B370B40301BBE7209F60DC4AF9B77A8EB44B05F40893AF655E61E0D7B89909CB5E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2943 412270-4122a2 SHGetSpecialFolderPathW 2944 412332-412348 SHGetSpecialFolderPathW 2943->2944 2945 4122a8-4122de 2943->2945 2946 41234a-41237d PathAppendW * 2 GetCurrentProcessId 2944->2946 2947 41239c-4123b2 call 413f30 2944->2947 2945->2944 2957 4122e0-412311 GetPrivateProfileStringW 2945->2957 2946->2947 2948 41237f-412394 OpenProcess 2946->2948 2951 4123b3-4123be call 411f70 2948->2951 2952 412396 GetLastError 2948->2952 2958 4123c0-4123cb ImpersonateLoggedOnUser 2951->2958 2959 4123d3-4123df CloseHandle 2951->2959 2952->2947 2957->2944 2960 412313-412330 2957->2960 2958->2959 2961 4123cd GetLastError 2958->2961 2959->2947 2962 4123e1-412427 CreateDirectoryW call 414e2c GetTempFileNameW 2959->2962 2960->2944 2960->2947 2961->2959 2966 412429-412437 DeleteFileW 2962->2966 2967 41243c-412444 RevertToSelf 2962->2967 2966->2967 2968 412446-412447 CloseHandle 2967->2968 2969 41244d-412452 2967->2969 2968->2969 2969->2947 2970 412458-412577 call 414e2c * 2 VerSetConditionMask * 3 VerifyVersionInfoW 2969->2970 2976 4125a1-4125b6 call 413f30 2970->2976 2977 412579-412586 GetModuleHandleW 2970->2977 2977->2976 2979 412588-412596 GetProcAddress 2977->2979 2979->2976 2981 412598-41259a 2979->2981 2981->2976
                                                APIs
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000), ref: 0041229A
                                                • GetPrivateProfileStringW.KERNEL32(ZoomChat,com.zoom.test.disable_crash_handler,00000000,?,00000008,?), ref: 00412309
                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000000), ref: 00412340
                                                • PathAppendW.SHLWAPI(?,ZoomVDI), ref: 00412357
                                                • PathAppendW.SHLWAPI(?,logs), ref: 0041236A
                                                • GetCurrentProcessId.KERNEL32 ref: 00412375
                                                • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00412388
                                                • GetLastError.KERNEL32 ref: 00412396
                                                • ImpersonateLoggedOnUser.ADVAPI32(00000000), ref: 004123C1
                                                • GetLastError.KERNEL32 ref: 004123CD
                                                • CloseHandle.KERNEL32(?), ref: 004123D7
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 004123EB
                                                • GetTempFileNameW.KERNEL32(?,zoomtest,00000000,?), ref: 0041241F
                                                • DeleteFileW.KERNEL32(?), ref: 00412431
                                                • RevertToSelf.ADVAPI32 ref: 0041243C
                                                • CloseHandle.KERNEL32(00000000), ref: 00412447
                                                • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 004124F5
                                                • VerSetConditionMask.KERNEL32(00000000), ref: 004124FD
                                                • VerSetConditionMask.KERNEL32(00000000), ref: 00412505
                                                • VerifyVersionInfoW.KERNEL32(?), ref: 0041253A
                                                • GetModuleHandleW.KERNEL32(zCrashReport.dll), ref: 0041257E
                                                • GetProcAddress.KERNEL32(00000000,crSetZoomHome), ref: 0041258E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Path$ConditionHandleMask$AppendCloseErrorFileFolderLastProcessSpecial$AddressCreateCurrentDeleteDirectoryImpersonateInfoLoggedModuleNameOpenPrivateProcProfileRevertSelfStringTempUserVerifyVersion
                                                • String ID: ZoomChat$ZoomVDI$\Zoom\data\Zoom.us.ini$com.zoom.test.disable_crash_handler$crSetZoomHome$logs$yes$zCrashReport.dll$zoomtest
                                                • API String ID: 1294346636-1563055977
                                                • Opcode ID: 6d4db1bb0bed33e30413c97dc72b642164295202b736abbae61969f2f0ffef42
                                                • Instruction ID: 12433930e13e6caf05908e59b317de0784475af6ab8e2ec7126003c472830eac
                                                • Opcode Fuzzy Hash: 6d4db1bb0bed33e30413c97dc72b642164295202b736abbae61969f2f0ffef42
                                                • Instruction Fuzzy Hash: FA81A271645344ABE720DFA0ED09FDB77ECAF84B01F40492AF948D61D0DBB89948CB5A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3024 4125c0-4125da WTHelperProvDataFromStateData 3025 4125e0-4125e8 3024->3025 3026 4126f8-412700 3024->3026 3025->3026 3027 4125ee 3025->3027 3028 4125f0-412602 WTHelperGetProvSignerFromChain 3027->3028 3028->3026 3029 412608-412610 3028->3029 3030 412616-412620 WTHelperGetProvCertFromChain 3029->3030 3031 4126e8-4126f2 3029->3031 3032 4126e5 3030->3032 3033 412626-41262b 3030->3033 3031->3026 3031->3028 3032->3031 3034 412631-412648 CertGetNameStringW 3033->3034 3035 41262d-41262f 3033->3035 3037 41264a-41264c 3034->3037 3038 41264e-412665 GetProcessHeap HeapAlloc 3034->3038 3036 4126a4-4126b6 3035->3036 3041 4126c5-4126df GetProcessHeap HeapFree 3036->3041 3042 4126b8-4126c3 call 413a80 3036->3042 3037->3036 3039 412667-412669 3038->3039 3040 41269f 3038->3040 3043 412670-412677 3039->3043 3044 4126a1 3040->3044 3041->3030 3041->3032 3042->3041 3049 412701-41271c GetProcessHeap HeapFree 3042->3049 3043->3043 3046 412679-41268d CertGetNameStringW 3043->3046 3044->3036 3046->3044 3048 41268f-412699 GetProcessHeap HeapFree 3046->3048 3048->3040
                                                APIs
                                                • WTHelperProvDataFromStateData.WINTRUST(?,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 004125CF
                                                • WTHelperGetProvSignerFromChain.WINTRUST(00000000,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 004125F7
                                                • WTHelperGetProvCertFromChain.WINTRUST(00000000,00000000,?,?,?,?,?,00412868), ref: 00412618
                                                • CertGetNameStringW.CRYPT32(?,00000004,00000000,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 0041263C
                                                • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,00412868), ref: 004126C8
                                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,00412868), ref: 004126CF
                                                • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,00412868), ref: 00412704
                                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,00412868), ref: 0041270B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Heap$FromHelperProv$CertChainDataFreeProcess$NameSignerStateString
                                                • String ID: Zoom Video Communications, Inc.$h(A
                                                • API String ID: 1193424130-546350467
                                                • Opcode ID: f5d44680248929655a779e8b52e6a80615bd4f95dfae2ca292d3e3ad0e7b2e22
                                                • Instruction ID: b50a9664b00a001a61916bde13f5431a76f3f421a5cc4ad1fd8f560c47aafd93
                                                • Opcode Fuzzy Hash: f5d44680248929655a779e8b52e6a80615bd4f95dfae2ca292d3e3ad0e7b2e22
                                                • Instruction Fuzzy Hash: 2241C330A40310BFDB209FA59D88BDFBB78FF48711F1044AAE905E72D0C6B499908A6C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3050 402820-402863 call 414fba 3054 4028e1-4028e8 3050->3054 3055 402865-40289a 3050->3055 3056 4028f9-402900 3054->3056 3057 4028ea-4028f0 3054->3057 3061 4028a0 call 408170 3055->3061 3059 402902-40290b 3056->3059 3060 40296c-4029ea call 402e6c 3056->3060 3057->3056 3067 402952-402955 3059->3067 3068 40290d-40293d 3059->3068 3093 4029f0-402a87 3060->3093 3094 402ce5-402cee 3060->3094 3063 4028a5-4028b4 call 401b8f 3061->3063 3073 4028b5 call 408170 3063->3073 3071 402e64-402e69 call 414f78 3067->3071 3072 40295b-402967 3067->3072 3079 402943 call 408170 3068->3079 3072->3071 3077 4028ba-4028c4 3073->3077 3085 4028c5 call 408170 3077->3085 3081 402948-40294a 3079->3081 3084 40294b call 408170 3081->3084 3086 402950-402951 3084->3086 3087 4028ca-4028d9 call 401b8f 3085->3087 3086->3067 3092 4028da call 408170 3087->3092 3095 4028df-4028e0 3092->3095 3137 402a8a call 4070fd 3093->3137 3098 402cf0-402cf3 3094->3098 3099 402d64-402d66 3094->3099 3095->3054 3103 402cf9 call 408345 3098->3103 3101 402d68-402d6e 3099->3101 3102 402d7a-402d84 3099->3102 3101->3102 3105 402d95-402d9b 3102->3105 3106 402d86-402d89 3102->3106 3104 402cfe-402d40 3103->3104 3113 402d46 call 408170 3104->3113 3107 402da1-402dc9 call 4098ca 3105->3107 3108 402e44-402e5f call 401e49 3105->3108 3110 402d8f 3106->3110 3123 402e34-402e36 3107->3123 3124 402dcb-402e02 3107->3124 3108->3071 3110->3105 3117 402d4b-402d56 call 401b8f 3113->3117 3127 402d57 call 408170 3117->3127 3123->3108 3126 402e38 3123->3126 3131 402e08 call 408170 3124->3131 3126->3108 3129 402d5c-402d63 3127->3129 3129->3099 3133 402e0d-402e1c call 401b8f 3131->3133 3139 402e1d call 408170 3133->3139 3138 402a8f-402a9e 3137->3138 3143 402aa4-402aa7 3138->3143 3144 402b6a-402b6d 3138->3144 3140 402e22-402e2c 3139->3140 3145 402e2d call 408170 3140->3145 3146 402aad call 408345 3143->3146 3147 402b7e-402b81 3144->3147 3148 402b6f-402b75 3144->3148 3149 402e32-402e33 3145->3149 3150 402ab2-402ac4 3146->3150 3151 402b92-402b9c 3147->3151 3152 402b83-402b89 3147->3152 3148->3147 3149->3123 3153 402aca call 408345 3150->3153 3154 402bad-402bb6 3151->3154 3155 402b9e-402ba4 3151->3155 3152->3151 3156 402acf-402b1f 3153->3156 3158 402bb8 call 401c30 3154->3158 3155->3154 3161 402b25 call 408170 3156->3161 3160 402bbd-402be8 3158->3160 3162 402be9 call 4097d3 3160->3162 3163 402b2a-402b34 3161->3163 3164 402bee-402bf7 3162->3164 3167 402b35 call 408170 3163->3167 3168 402c94-402c9e 3164->3168 3169 402bfd-402c40 3164->3169 3170 402b3a-402b45 call 401b8f 3167->3170 3171 402ca0-402ca6 3168->3171 3172 402caf-402ce0 3168->3172 3178 402c46 call 408170 3169->3178 3176 402b46 call 408170 3170->3176 3171->3172 3172->3110 3179 402b4b-402b56 call 401b8f 3176->3179 3180 402c4b-402c5a call 401b8f 3178->3180 3187 402b57 call 408170 3179->3187 3186 402c5b call 408170 3180->3186 3189 402c60-402c6a 3186->3189 3190 402b5c-402b69 3187->3190 3193 402c6b call 408170 3189->3193 3190->3144 3194 402c70-402c7a 3193->3194 3196 402c7b call 408170 3194->3196 3197 402c80-402c8c call 401b8f 3196->3197 3200 402c8d call 408170 3197->3200 3201 402c92-402c93 3200->3201 3201->3168
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040282A
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                  • Part of subcall function 00402E6C: __EH_prolog3.LIBCMT ref: 00402E73
                                                Strings
                                                • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertProgressMessage strTaskID:, xrefs: 00402C3A
                                                • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertFinishMessage strTaskID:, xrefs: 00402DFC
                                                • , strEncryptedFilePath:, xrefs: 00402B01, 00402C1A
                                                • , strPageImgName:, xrefs: 00402888
                                                • , m_nVbsSucessNum:, xrefs: 00402DF7
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 0040286C, 00402914, 00402AE8, 00402C04, 00402D14, 00402DD2
                                                • , uPageIndexFinished:, xrefs: 0040288E, 00402C20
                                                • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] m_ipcSender is NULL!, xrefs: 00402934
                                                • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] EncryptImgFile bEncrypt:, xrefs: 00402B19
                                                • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] strTaskID:, xrefs: 00402893
                                                • , strImageFilePath:, xrefs: 00402B06
                                                • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] fn.IsExists is false! strImageFilePath:, xrefs: 00402D34
                                                • , m_nPPTSliderShowNum:, xrefs: 00402C35
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$H_prolog3ProtectVirtual
                                                • String ID: , m_nPPTSliderShowNum:$, m_nVbsSucessNum:$, strEncryptedFilePath:$, strImageFilePath:$, strPageImgName:$, uPageIndexFinished:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] EncryptImgFile bEncrypt:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertFinishMessage strTaskID:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertProgressMessage strTaskID:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] fn.IsExists is false! strImageFilePath:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] m_ipcSender is NULL!$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 2383558652-3366109944
                                                • Opcode ID: bd2a8017478969f8550b368d860d8566346eaa83fdf1b42b377f117a52fa0dba
                                                • Instruction ID: 7ac1cac9bd74252e321e61f593a8f3a43cd74f212c4c8407b1e11f1666e8ce68
                                                • Opcode Fuzzy Hash: bd2a8017478969f8550b368d860d8566346eaa83fdf1b42b377f117a52fa0dba
                                                • Instruction Fuzzy Hash: 96F15C31944308ABDB14DB64DD5ABDD7BB4AF08314F1085AEE44AB71E1DF786E84CB18

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3202 40385c-403880 call 414fba 3206 403882-4038ac 3202->3206 3207 4038be-4038c5 3202->3207 3213 4038af call 408170 3206->3213 3208 4038c7-4038d0 3207->3208 3209 4038d9-4038dc 3207->3209 3208->3209 3210 40394c-403958 CoInitialize 3209->3210 3211 4038de-4038e7 3209->3211 3214 403a00-403a09 3210->3214 3215 40395e-403967 3210->3215 3220 403930 3211->3220 3221 4038e9-40391c 3211->3221 3216 4038b4-4038b6 3213->3216 3223 403a52 3214->3223 3224 403a0b-403a3e 3214->3224 3227 4039d9 3215->3227 3228 403969-4039af GetLastError 3215->3228 3218 4038b7 call 408170 3216->3218 3225 4038bc-4038bd 3218->3225 3226 403933-403936 3220->3226 3241 40391f call 408170 3221->3241 3231 403a55-403a5c 3223->3231 3242 403a41 call 408170 3224->3242 3225->3207 3229 403944-403947 3226->3229 3230 403938 3226->3230 3232 4039dc-4039e3 3227->3232 3245 4039b0 call 408170 3228->3245 3235 403c81-403c86 call 414f78 3229->3235 3230->3229 3236 403a70-403a7b 3231->3236 3237 403a5e-403a67 3231->3237 3238 403c10-403c1f 3232->3238 3239 4039e9-4039fb 3232->3239 3244 403a7c call 406ae2 3236->3244 3237->3236 3256 403c21-403c55 3238->3256 3257 403c6f-403c71 3238->3257 3239->3238 3246 403924-403926 3241->3246 3248 403a46-403a48 3242->3248 3252 403a81-403a93 3244->3252 3253 4039b5-4039bf 3245->3253 3247 403927 call 408170 3246->3247 3254 40392c-40392e 3247->3254 3255 403a49 call 408170 3248->3255 3258 403a95 call 407c9a 3252->3258 3265 4039c0 call 408170 3253->3265 3254->3226 3260 403a4e-403a50 3255->3260 3269 403c58 call 408170 3256->3269 3261 403c73 3257->3261 3262 403c7f 3257->3262 3263 403a9a-403ab2 call 406de3 3258->3263 3260->3231 3261->3262 3262->3235 3273 403af3-403af9 3263->3273 3274 403ab4-403ae1 3263->3274 3268 4039c5-4039cf 3265->3268 3275 4039d0 call 408170 3268->3275 3270 403c5d-403c67 3269->3270 3280 403c68 call 408170 3270->3280 3278 403afb-403b04 3273->3278 3279 403b0d-403b11 3273->3279 3286 403ae4 call 408170 3274->3286 3277 4039d5-4039d7 3275->3277 3277->3232 3278->3279 3283 403b13-403b18 3279->3283 3284 403b7b-403b83 3279->3284 3282 403c6d-403c6e 3280->3282 3282->3257 3283->3284 3285 403b1a-403b26 3283->3285 3291 403b85-403bc4 GetLastError 3284->3291 3292 403bec-403bef 3284->3292 3293 403b67-403b6a 3285->3293 3294 403b28-403b55 3285->3294 3287 403ae9-403aeb 3286->3287 3290 403aec call 408170 3287->3290 3295 403af1-403af2 3290->3295 3301 403bc5 call 408170 3291->3301 3296 403bf1-403bf4 3292->3296 3297 403c03-403c07 3292->3297 3293->3297 3299 403b70-403b79 3293->3299 3304 403b58 call 408170 3294->3304 3295->3273 3300 403bfa 3296->3300 3297->3238 3299->3300 3300->3297 3303 403bca-403bd4 3301->3303 3308 403bd5 call 408170 3303->3308 3305 403b5d-403b5f 3304->3305 3307 403b60 call 408170 3305->3307 3309 403b65-403b66 3307->3309 3310 403bda-403be4 3308->3310 3309->3293 3312 403be5 call 408170 3310->3312 3313 403bea-403beb 3312->3313 3313->3292
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 0040394D
                                                • GetLastError.KERNEL32(00419E1C), ref: 00403998
                                                • __EH_prolog3_GS.LIBCMT ref: 00403866
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::InitPPTApp] already init success, don't need init twice!, xrefs: 00403913
                                                • [CDocConvert::::InitPPTApp] m_appPPT.CreateInstance Begin!, xrefs: 00403A35
                                                • [CDocConvert::InitPPTApp] Success, xrefs: 00403B4C
                                                • [CDocConvert::::InitPPTApp] m_appPPT.CreateInstance End!, xrefs: 00403AD8
                                                • [CDocConvert::InitPPTApp] bRet: , xrefs: 00403C49
                                                • GetLastError:, xrefs: 0040399F, 00403BB4
                                                • [CDocConvert::InitPPTApp] m_appPPT.CreateInstance failed! hr:, xrefs: 00403BBF
                                                • [CDocConvert::InitPPTApp], xrefs: 004038A5
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403889, 004038F0, 00403970, 00403A12, 00403ABB, 00403B2F, 00403B8B, 00403C28
                                                • [CDocConvert::InitPPTApp] CoInitialize failed! hr:, xrefs: 004039AA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ErrorH_prolog3_InitializeLastProtectVirtual
                                                • String ID: GetLastError:$[CDocConvert::::InitPPTApp] m_appPPT.CreateInstance Begin!$[CDocConvert::::InitPPTApp] m_appPPT.CreateInstance End!$[CDocConvert::InitPPTApp]$[CDocConvert::InitPPTApp] CoInitialize failed! hr:$[CDocConvert::InitPPTApp] Success$[CDocConvert::InitPPTApp] already init success, don't need init twice!$[CDocConvert::InitPPTApp] bRet: $[CDocConvert::InitPPTApp] m_appPPT.CreateInstance failed! hr:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 81410529-2550331507
                                                • Opcode ID: a1d979d50b407f588d9ae7c930a741d1c243bb16bd1f797c0998d9925e67fd5d
                                                • Instruction ID: 57b23c03f83f004b13c8609271ebef5c86295075e4918dc55f590b15d17cc4e0
                                                • Opcode Fuzzy Hash: a1d979d50b407f588d9ae7c930a741d1c243bb16bd1f797c0998d9925e67fd5d
                                                • Instruction Fuzzy Hash: 09B17F71A40304AFDB049FA4EC9ABDD7B74EB08721F20856EF552B61E1DB785E81CA1C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3314 40e290-40e2ce 3315 40e2d4-40e2d8 3314->3315 3316 40e619 3314->3316 3315->3316 3317 40e2de-40e2e0 3315->3317 3318 40e61e-40e639 call 413f30 3316->3318 3317->3316 3319 40e2e6-40e303 call 40fa40 3317->3319 3324 40e305-40e307 3319->3324 3325 40e356-40e363 3319->3325 3324->3325 3328 40e309-40e311 3324->3328 3326 40e365 3325->3326 3327 40e36b-40e3cf call 410b10 call 410270 * 4 3325->3327 3326->3327 3348 40e3d0-40e3d9 3327->3348 3328->3325 3330 40e313-40e31a 3328->3330 3332 40e321-40e328 3330->3332 3334 40e330-40e338 3332->3334 3335 40e32a-40e32e 3332->3335 3337 40e33a-40e33f 3334->3337 3338 40e343-40e347 3334->3338 3335->3334 3335->3337 3337->3332 3340 40e341 3337->3340 3338->3325 3341 40e349-40e34e 3338->3341 3340->3325 3341->3325 3343 40e350-40e353 3341->3343 3343->3325 3348->3348 3349 40e3db-40e441 call 40fef0 * 2 EnterCriticalSection 3348->3349 3354 40e443-40e45b call 40fc90 3349->3354 3355 40e45d-40e468 call 4105e0 3349->3355 3359 40e46d-40e47e LeaveCriticalSection 3354->3359 3355->3359 3360 40e480-40e492 3359->3360 3361 40e4ae-40e4b8 3359->3361 3362 40e4a4-40e4ab call 4141bf 3360->3362 3363 40e494-40e4a2 3360->3363 3364 40e4ba-40e4cc 3361->3364 3365 40e4ee-40e4f2 3361->3365 3362->3361 3363->3362 3368 40e4de 3363->3368 3370 40e4e4-40e4eb call 4141bf 3364->3370 3371 40e4ce-40e4dc 3364->3371 3366 40e4f4-40e507 call 40e060 call 40e700 3365->3366 3367 40e50c-40e514 GetProcessWindowStation 3365->3367 3379 40e5c9 3366->3379 3374 40e5ba-40e5c3 GetCurrentProcess TerminateProcess 3367->3374 3375 40e51a-40e53c GetUserObjectInformationA 3367->3375 3368->3370 3370->3365 3371->3368 3371->3370 3374->3379 3375->3374 3380 40e53e-40e544 3375->3380 3382 40e5cb-40e617 call 40f8b0 3379->3382 3380->3374 3383 40e546-40e559 call 40f960 3380->3383 3382->3318 3389 40e55b 3383->3389 3390 40e55d-40e578 MessageBoxW 3383->3390 3389->3390 3392 40e57a-40e58c 3390->3392 3393 40e5ae-40e5b1 3390->3393 3394 40e5a4-40e5ab call 4141bf 3392->3394 3395 40e58e-40e59c 3392->3395 3393->3374 3396 40e5b3-40e5b8 3393->3396 3394->3393 3395->3394 3398 40e59e 3395->3398 3396->3382 3398->3394
                                                APIs
                                                • EnterCriticalSection.KERNEL32(004270B0,00000000,00000000,00000000,-00000002,?), ref: 0040E42C
                                                • LeaveCriticalSection.KERNEL32(004270B0,?,?), ref: 0040E46E
                                                • GetProcessWindowStation.USER32 ref: 0040E50C
                                                • GetUserObjectInformationA.USER32(00000000,00000001,?,0000000C,00000000), ref: 0040E534
                                                • MessageBoxW.USER32(00000000,00000000,Zoom VDI Workspace,00000134), ref: 0040E56A
                                                • GetCurrentProcess.KERNEL32(00000000), ref: 0040E5BC
                                                • TerminateProcess.KERNEL32(00000000), ref: 0040E5C3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Process$CriticalSection$CurrentEnterInformationLeaveMessageObjectStationTerminateUserWindow
                                                • String ID: Are you sure you want to run this software?$ from an unknown publisher.$ is using $/$Zoom VDI Workspace$\
                                                • API String ID: 2420998183-416803619
                                                • Opcode ID: 2bf8120df42d5ae13eb7732456e3f9a56e850d34b8fa7da0e23844d81cef106c
                                                • Instruction ID: 267653b6ebe412005e2447c441a6f636b24535a257520f429c62a23f51abf88a
                                                • Opcode Fuzzy Hash: 2bf8120df42d5ae13eb7732456e3f9a56e850d34b8fa7da0e23844d81cef106c
                                                • Instruction Fuzzy Hash: 8BB1D131A00209DBCB14DFA5C995BEEB7B1EF44304F14893EE802A72D1DB78AD95CB58
                                                APIs
                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(0042CA60,00000FA0,?,?,00414205), ref: 00414233
                                                • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00414205), ref: 0041423E
                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00414205), ref: 0041424F
                                                • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00414261
                                                • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0041426F
                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00414205), ref: 00414292
                                                • DeleteCriticalSection.KERNEL32(0042CA60,00000007,?,?,00414205), ref: 004142B5
                                                • CloseHandle.KERNEL32(00000000,?,?,00414205), ref: 004142C5
                                                Strings
                                                • kernel32.dll, xrefs: 0041424A
                                                • WakeAllConditionVariable, xrefs: 00414267
                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00414239
                                                • SleepConditionVariableCS, xrefs: 0041425B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                • API String ID: 2565136772-3242537097
                                                • Opcode ID: 7be4f200a74566f98bae5b6bf37b9bf44712cfd1cf6637fc1aae46b7f6747bf0
                                                • Instruction ID: eadbdf53527f21697c7c976fa47b2d8f361e7f744fd41d0908bb9d316aa554bb
                                                • Opcode Fuzzy Hash: 7be4f200a74566f98bae5b6bf37b9bf44712cfd1cf6637fc1aae46b7f6747bf0
                                                • Instruction Fuzzy Hash: 7901D231B807156BDB209B70BD5DBDF3A98AF84B907144472FC01D2290EA788CC08A9D
                                                APIs
                                                • SysAllocString.OLEAUT32(?), ref: 00411609
                                                • SysFreeString.OLEAUT32(-00000001), ref: 0041168E
                                                • SysFreeString.OLEAUT32(-00000001), ref: 004116D1
                                                • VariantClear.OLEAUT32(00000000), ref: 00411798
                                                • VariantClear.OLEAUT32(00000001), ref: 00411807
                                                • CoUninitialize.OLE32(?,?,?), ref: 0041183C
                                                • _com_issue_error.COMSUPP ref: 00411862
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: String$ClearFreeVariant$AllocUninitialize_com_issue_error
                                                • String ID: POWERPNT.exe$ProcessId$SELECT * FROM Win32_Process where name='%s'$WQL
                                                • API String ID: 4015948099-2835684465
                                                • Opcode ID: 4cae6ba28725c6cddbb5ed1f9e0ff0da51b4a2f84b92ba040e82ed207b66b41a
                                                • Instruction ID: a58cffc29cf6f6dc8c416da25baa1a5b74b5660a5db0f35f5bfc5b23c7ff9db2
                                                • Opcode Fuzzy Hash: 4cae6ba28725c6cddbb5ed1f9e0ff0da51b4a2f84b92ba040e82ed207b66b41a
                                                • Instruction Fuzzy Hash: EC9191706043019FD310DF24C855F9BB7E8AF88708F14851EF559DB2A0EB79E985CB9A
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 004035C8
                                                • TerminateThread.KERNEL32(00000000,00000000), ref: 00403737
                                                • CloseHandle.KERNEL32(00000000), ref: 00403740
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                • TerminateThread.KERNEL32(00000000,00000000), ref: 00403840
                                                • CloseHandle.KERNEL32(00000000), ref: 00403849
                                                Strings
                                                • CDocConvert CleanThread , xrefs: 00403603
                                                • [CDocConvert::CleanThread] m_eventExitDetectThreadRsp.Lock lockRet:, xrefs: 0040379E
                                                • [CDocConvert::CleanThread] TerminateThread m_hThreadConvert!, xrefs: 004036FC
                                                • [CDocConvert::CleanThread] TerminateThread m_hThreadDetect!, xrefs: 0040380F
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 004035E7, 0040366A, 004036E0, 0040377D, 004037EF
                                                • [CDocConvert::CleanThread] m_eventExitConvertThreadRsp.Lock lockRet:, xrefs: 0040368B
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CloseHandleTerminateThread$H_prolog3ProtectVirtual
                                                • String ID: CDocConvert CleanThread $[CDocConvert::CleanThread] TerminateThread m_hThreadConvert!$[CDocConvert::CleanThread] TerminateThread m_hThreadDetect!$[CDocConvert::CleanThread] m_eventExitConvertThreadRsp.Lock lockRet:$[CDocConvert::CleanThread] m_eventExitDetectThreadRsp.Lock lockRet:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 3327035812-490934195
                                                • Opcode ID: ee8d1510abf3b5228d5ff3d454226bc46edae28d685278d321626e8e0c5e821f
                                                • Instruction ID: c58c28c889137a41e0bcbd66b77d7563fd19abb7d98ff48b9d8d5a56de94fa08
                                                • Opcode Fuzzy Hash: ee8d1510abf3b5228d5ff3d454226bc46edae28d685278d321626e8e0c5e821f
                                                • Instruction Fuzzy Hash: 6E61A471950700ABD7249F60DC5ABDE7BB4FF08721F244A6EF452A61E1DBB85E80CA0C
                                                APIs
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 0040AC75
                                                • __EH_prolog3_GS.LIBCMT ref: 0040AC85
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvertVbsIPCServer::Init] is already inited. UnInit first., xrefs: 0040AD04
                                                • [CDocConvertVbsIPCServer::Init] is_good:, xrefs: 0040AFA3
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040ACE5, 0040ADB1, 0040AEDD, 0040AF7A
                                                • [CDocConvertVbsIPCServer::Init], xrefs: 0040ACA2
                                                • com.zoom.ipc.doccovtvbsapp_, xrefs: 0040AD73
                                                • [CDocConvertVbsIPCServer::Init] ipc_server_:, xrefs: 0040AF00
                                                • [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer] chanel_name_:, xrefs: 0040ADD1
                                                • , start_succ:, xrefs: 0040AF91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_taskH_prolog3_ProtectVirtual
                                                • String ID: , start_succ:$[CDocConvertVbsIPCServer::CDocConvertVbsIPCServer] chanel_name_:$[CDocConvertVbsIPCServer::Init]$[CDocConvertVbsIPCServer::Init] ipc_server_:$[CDocConvertVbsIPCServer::Init] is already inited. UnInit first.$[CDocConvertVbsIPCServer::Init] is_good:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp$com.zoom.ipc.doccovtvbsapp_
                                                • API String ID: 2490808664-150838044
                                                • Opcode ID: 53ac09ad68d1f9039d5a559351e08a01484ee2d6fa628184f6c129e6662fa568
                                                • Instruction ID: 149bc477d0c5e852371e299875de303a08aa14c6ab15b4b396115825e528068c
                                                • Opcode Fuzzy Hash: 53ac09ad68d1f9039d5a559351e08a01484ee2d6fa628184f6c129e6662fa568
                                                • Instruction Fuzzy Hash: 22E1BC71900314ABDB149F64DD9ABDEBBB1FF48304F14806EE40AA72D1DB785E81CB19
                                                APIs
                                                • FreeLibrary.KERNEL32 ref: 0040A687
                                                • GetProcAddress.KERNEL32 ref: 0040A497
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvertIPCAgent::LoadWebService] Error, pfInitModule is NULL!, xrefs: 0040A4DC
                                                • zoomus.class.ISBWebServiceAPI, xrefs: 0040A583
                                                • [CDocConvertIPCAgent::LoadWebService] Error, pSBWebService is NULL!, xrefs: 0040A5D6
                                                • [CDocConvertIPCAgent::LoadWebService] Error, pMQClientWebService is NULL!, xrefs: 0040A554
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp, xrefs: 0040A4B9, 0040A531, 0040A5B4, 0040A61B, 0040A6B7
                                                • [CDocConvertIPCAgent::LoadWebService] bRet is false, will unload!, xrefs: 0040A63B
                                                • [CDocConvertIPCAgent::LoadWebService] bRet:, xrefs: 0040A6DC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: AddressFreeLibraryProcProtectVirtual
                                                • String ID: [CDocConvertIPCAgent::LoadWebService] Error, pMQClientWebService is NULL!$[CDocConvertIPCAgent::LoadWebService] Error, pSBWebService is NULL!$[CDocConvertIPCAgent::LoadWebService] Error, pfInitModule is NULL!$[CDocConvertIPCAgent::LoadWebService] bRet is false, will unload!$[CDocConvertIPCAgent::LoadWebService] bRet:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp$zoomus.class.ISBWebServiceAPI
                                                • API String ID: 534670035-2533332826
                                                • Opcode ID: 3290f3a2f0dd1c719ba24301017fcf22caaa84da7f66635076d447e772284814
                                                • Instruction ID: af3e93a29a9dffe31318a46e62a52793d8324cc7d565a543d3ddef1080db9eef
                                                • Opcode Fuzzy Hash: 3290f3a2f0dd1c719ba24301017fcf22caaa84da7f66635076d447e772284814
                                                • Instruction Fuzzy Hash: D061CF72A40304ABE7149B64DC5ABEE77B0EF04720F24496EE512F62E1DBB84D81CA0D
                                                APIs
                                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000), ref: 0041275C
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,?), ref: 004127F3
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412814
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412832
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00412881
                                                • HeapFree.KERNEL32(00000000), ref: 00412888
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 0041289F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: TrustVerify$Heap$CreateFileFreeProcess
                                                • String ID: 4
                                                • API String ID: 844456146-4088798008
                                                • Opcode ID: 9e3167213d219f8f1cf1ea40f5b04b6ce5d237ab1975849d844118587953a85b
                                                • Instruction ID: 30a4058f0173cd2fa46ea9dbc6a0dfddb02297b452ecc5d162b3dce015d20828
                                                • Opcode Fuzzy Hash: 9e3167213d219f8f1cf1ea40f5b04b6ce5d237ab1975849d844118587953a85b
                                                • Instruction Fuzzy Hash: A65121B1D002499BDF10DFD9C984BEEBBB8BF48314F108229E815B7290D7B45999CF65
                                                APIs
                                                • GetProcAddress.KERNEL32(00000000,TermModule), ref: 0040A7E8
                                                • FreeLibrary.KERNEL32(00000000), ref: 0040A874
                                                • __EH_prolog3.LIBCMT ref: 0040A720
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvertIPCAgent::UnLoadWebService] Error, m_hModuleWebservice is NULL!, xrefs: 0040A7C0
                                                • [CDocConvertIPCAgent::UnLoadWebService], xrefs: 0040A75B
                                                • TermModule, xrefs: 0040A7E0
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp, xrefs: 0040A732, 0040A743, 0040A7A4, 0040A806, 0040A894
                                                • [CDocConvertIPCAgent::UnLoadWebService] return CmmTrue!, xrefs: 0040A8B4
                                                • [CDocConvertIPCAgent::UnLoadWebService] Error, pfTermModule is NULL!, xrefs: 0040A826
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: AddressFreeH_prolog3LibraryProcProtectVirtual
                                                • String ID: TermModule$[CDocConvertIPCAgent::UnLoadWebService]$[CDocConvertIPCAgent::UnLoadWebService] Error, m_hModuleWebservice is NULL!$[CDocConvertIPCAgent::UnLoadWebService] Error, pfTermModule is NULL!$[CDocConvertIPCAgent::UnLoadWebService] return CmmTrue!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp
                                                • API String ID: 3777936632-3443123305
                                                • Opcode ID: ceb88864714ad80e6b653e614704c2039d078bb7c436caedcb3683162fbccc4e
                                                • Instruction ID: ba2ad7c8cb7d965e1e82bf5b0aabdcc5086ac0a5988c5af8798d1d52c742b88f
                                                • Opcode Fuzzy Hash: ceb88864714ad80e6b653e614704c2039d078bb7c436caedcb3683162fbccc4e
                                                • Instruction Fuzzy Hash: 3B41A172940300AFE714AB64DC5ABDE37B0FB04325F20897EE042A61E1DBBC9D91CA1D
                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000,00429068,?,?), ref: 0041293A
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,?), ref: 004129A5
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 004129C6
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 004129E4
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004129FE
                                                • HeapFree.KERNEL32(00000000), ref: 00412A05
                                                • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412A1C
                                                • CloseHandle.KERNEL32(00000000), ref: 00412A35
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: TrustVerify$Heap$CloseCreateFileFreeHandleProcess
                                                • String ID: 4
                                                • API String ID: 2170017040-4088798008
                                                • Opcode ID: 8770e014fbd8c3404b5246c69a0cf5acd8f86c54a6182c4c019deb2d28d51030
                                                • Instruction ID: 4e2db92958abd06cf54a71d5c530e8a3d2865fa8e82589dd7844bb842cae8d26
                                                • Opcode Fuzzy Hash: 8770e014fbd8c3404b5246c69a0cf5acd8f86c54a6182c4c019deb2d28d51030
                                                • Instruction Fuzzy Hash: 8C4130B1D00218ABDB10CFD9DD84BDEBBB8EF04324F10422AE825B72D0D7B459458F64
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040C29C
                                                  • Part of subcall function 0040D0B0: SetDllDirectoryW.KERNEL32(00419D44), ref: 0040D0D1
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003), ref: 0040D107
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000001,00000003), ref: 0040D113
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000020,00000003,?,00000001,00000003), ref: 0040D11F
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D12B
                                                  • Part of subcall function 0040D0B0: VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 0040D13A
                                                  • Part of subcall function 0040D0B0: GetLastError.KERNEL32(?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D144
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D190
                                                  • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D19C
                                                  • Part of subcall function 0040D0B0: VerifyVersionInfoW.KERNEL32(?,00000003,00000000), ref: 0040D1AB
                                                  • Part of subcall function 0040D0B0: LoadLibraryExW.KERNEL32(cryptnet.dll,00000000,00000800,SOFTWARE\Microsoft\Cryptography\Defaults\Provider,Image Path,SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv,Dll,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D1ED
                                                  • Part of subcall function 0040D0B0: GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D200
                                                  • Part of subcall function 0040D0B0: OpenProcessToken.ADVAPI32(00000000,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D207
                                                  • Part of subcall function 00412270: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000), ref: 0041229A
                                                  • Part of subcall function 00412270: GetPrivateProfileStringW.KERNEL32(ZoomChat,com.zoom.test.disable_crash_handler,00000000,?,00000008,?), ref: 00412309
                                                  • Part of subcall function 00412270: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000000), ref: 00412340
                                                  • Part of subcall function 00412270: PathAppendW.SHLWAPI(?,ZoomVDI), ref: 00412357
                                                  • Part of subcall function 00412270: PathAppendW.SHLWAPI(?,logs), ref: 0041236A
                                                  • Part of subcall function 00412270: GetCurrentProcessId.KERNEL32 ref: 00412375
                                                  • Part of subcall function 00412270: OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00412388
                                                  • Part of subcall function 00412270: GetLastError.KERNEL32 ref: 00412396
                                                • SetErrorMode.KERNEL32(00000002,?,000001B0), ref: 0040C2BD
                                                  • Part of subcall function 004121E0: GetModuleHandleW.KERNEL32(zCrashReport.dll,0040C2C8,?,000001B0), ref: 004121E5
                                                  • Part of subcall function 004121E0: GetProcAddress.KERNEL32(00000000,crSetCrashCallbackW), ref: 004121F5
                                                • GetCurrentThreadId.KERNEL32 ref: 0040C31F
                                                • SetConsoleCtrlHandler.KERNEL32(Function_0000C1F0,00000001), ref: 0040C331
                                                • SetTimer.USER32(00000000,00000001,00000032,Function_0000C280), ref: 0040C340
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040C352
                                                • TranslateMessage.USER32(?), ref: 0040C364
                                                • DispatchMessageW.USER32(?), ref: 0040C371
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040C381
                                                • SetConsoleCtrlHandler.KERNEL32(Function_0000C1F0,00000000), ref: 0040C38D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ConditionMask$MessagePathProcess$CurrentError$AppendConsoleCtrlFolderHandlerInfoLastOpenSpecialVerifyVersion$AddressDirectoryDispatchH_prolog3_HandleLibraryLoadModeModulePrivateProcProfileStringThreadTimerTokenTranslate
                                                • String ID:
                                                • API String ID: 3343810788-0
                                                • Opcode ID: 8dadc06e9dbc00c87a32a17101f0fe4498e6a079432756071ec74662e6223704
                                                • Instruction ID: 0df3743305b4662a0f30d548fb76cd88d12e2cbeb7f902348f3e3a882e6e6513
                                                • Opcode Fuzzy Hash: 8dadc06e9dbc00c87a32a17101f0fe4498e6a079432756071ec74662e6223704
                                                • Instruction Fuzzy Hash: 332151B1900219DBDB209B61DC98ADE7778BF46705F4086BAF506A21A0D7388E45CF59
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040BA6D
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                Strings
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strIPCMessage:, xrefs: 0040BAB4
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040BA97, 0040BB0B, 0040BC60, 0040BD10
                                                • , nPageCount:, xrefs: 0040BC8C
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] call HandleIPC_VBSIPCConvertProgressMessage., xrefs: 0040BD2D
                                                • , nPageShowCount:, xrefs: 0040BC86
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] m_MessageHandler is NULL!, xrefs: 0040BB2B
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strTaskID:, xrefs: 0040BC91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$ProtectVirtual
                                                • String ID: , nPageCount:$, nPageShowCount:$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] call HandleIPC_VBSIPCConvertProgressMessage.$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] m_MessageHandler is NULL!$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strIPCMessage:$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 624373510-3212152969
                                                • Opcode ID: 33cc2ba9570ac06e666546046795ba742bea2b67b153925532d20454076ccba8
                                                • Instruction ID: 4651389eddfd64d4942431231ff233d34f5cc01462db626f5184f5cb9502775e
                                                • Opcode Fuzzy Hash: 33cc2ba9570ac06e666546046795ba742bea2b67b153925532d20454076ccba8
                                                • Instruction Fuzzy Hash: 5A916B32904309ABDB159BA4DC99ADDBBB4EF18311F20802EE406B72D1DF785E85CB5C
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040BDA3
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                Strings
                                                • , nPageFinishIndex:, xrefs: 0040BFD6
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] m_MessageHandler is NULL!, xrefs: 0040BE76
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strIPCMessage:, xrefs: 0040BDF6
                                                • , strImgName:, xrefs: 0040BFC4
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040BDD9, 0040BE56, 0040BFAE, 0040C061
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strTaskID:, xrefs: 0040BFDB
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] call HandleIPC_VBSIPCConvertProgressMessage., xrefs: 0040C07E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$ProtectVirtual
                                                • String ID: , nPageFinishIndex:$, strImgName:$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] call HandleIPC_VBSIPCConvertProgressMessage.$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] m_MessageHandler is NULL!$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strIPCMessage:$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 624373510-647356355
                                                • Opcode ID: 6eb867db84de515e8873a264e4678672b7ceeaedb205744788f40ebcfedc3da4
                                                • Instruction ID: 469fe8e027f0674d6574de2f878ccbdcf436e3ac4ee0606df8ab73521b966ea5
                                                • Opcode Fuzzy Hash: 6eb867db84de515e8873a264e4678672b7ceeaedb205744788f40ebcfedc3da4
                                                • Instruction Fuzzy Hash: 1F918C7190020ADBDB149B64DD9ABDDBBB4EF04314F1080AEE50AB71E1DF385E85CB58
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00403C91
                                                • CoUninitialize.OLE32 ref: 00403E2C
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                • _com_issue_error.COMSUPP ref: 00403E99
                                                Strings
                                                • [CDocConvert::ExitPPTApp] m_appPPT->Quit() , xrefs: 00403D72
                                                • [CDocConvert::ExitPPTApp] End, xrefs: 00403E62
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403CB0, 00403D4F, 00403DD8, 00403E42
                                                • [CDocConvert::ExitPPTApp] m_bInitApp: , xrefs: 00403CD6
                                                • [CDocConvert::ExitPPTApp] m_appPPT->Release() , xrefs: 00403DF4
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectUninitializeVirtual_com_issue_error
                                                • String ID: [CDocConvert::ExitPPTApp] End$[CDocConvert::ExitPPTApp] m_appPPT->Quit() $[CDocConvert::ExitPPTApp] m_appPPT->Release() $[CDocConvert::ExitPPTApp] m_bInitApp: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 2656218265-3493313017
                                                • Opcode ID: 68727294244794ec20b2fcd33cccc9c7da88c9a4e79c3c41485c4c0f148f8f61
                                                • Instruction ID: 18cc4debb24305264030b38cec7edcd4e448e4ec5132a04508bf7c38e9d3671c
                                                • Opcode Fuzzy Hash: 68727294244794ec20b2fcd33cccc9c7da88c9a4e79c3c41485c4c0f148f8f61
                                                • Instruction Fuzzy Hash: C8519A32940714ABDB15DF60EC9ABDE7B74FF08321F24466EE411AA1E1CB785E81CA4C
                                                APIs
                                                Strings
                                                • [CDocConvert::ConvertDetectTimeout]! strDetectGUID: , xrefs: 00403172
                                                • u64CurTicket:, xrefs: 0040315D
                                                • > u64Timestamp:, xrefs: 00403152
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403124
                                                • enumDetectFunc: , xrefs: 0040316D
                                                • u32TimeoutMS:, xrefs: 00403165
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Count64H_prolog3_Tick
                                                • String ID: > u64Timestamp:$ enumDetectFunc: $ u32TimeoutMS:$ u64CurTicket:$[CDocConvert::ConvertDetectTimeout]! strDetectGUID: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 2049389690-960057003
                                                • Opcode ID: aeb70f4b85a6121d81040206a75301ce84ee70978a23e64459917e3ece7cfb56
                                                • Instruction ID: 5c79b996fac3b27d7f1accdab238eb015067ee496fef3d9631b613940f5ef827
                                                • Opcode Fuzzy Hash: aeb70f4b85a6121d81040206a75301ce84ee70978a23e64459917e3ece7cfb56
                                                • Instruction Fuzzy Hash: 45413B72D04208AFDF05EFE4E8599DDBBB5AF08311F20842EF401B72E1DB7869818B58
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?,?,?,?,00000118), ref: 0040D599
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000C7,00000000,00000000,00000000,00000000), ref: 0040D5D6
                                                • RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00020019,?), ref: 0040D651
                                                • RegGetValueW.ADVAPI32(00000000,00000000,?,0000FFFF,?,?,00000F9E), ref: 0040D6B4
                                                • RegCloseKey.ADVAPI32(?), ref: 0040D6C2
                                                • PathIsRelativeW.SHLWAPI(?), ref: 0040D706
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0040D722
                                                • RegEnumKeyExW.ADVAPI32(?,00000001,?,?,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,00000118), ref: 0040D766
                                                • RegCloseKey.ADVAPI32(?,?,?,?,00000118), ref: 0040D780
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CloseEnumOpen$LibraryLoadPathRelativeValue
                                                • String ID:
                                                • API String ID: 1037566479-0
                                                • Opcode ID: e0210c049c3d1df363a3a1cebf10b4b002481ffbb24948399b8ebf1762638dab
                                                • Instruction ID: 192eedeed3cfc7c9a8b2c8425a5b0a1a089aeacab8846db5a4ff0d926e04e858
                                                • Opcode Fuzzy Hash: e0210c049c3d1df363a3a1cebf10b4b002481ffbb24948399b8ebf1762638dab
                                                • Instruction Fuzzy Hash: D261B435E00218ABDB349F94CC55FEB7378EB48744F0405AAFA09B7280D775AF89CA58
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00411653,00411655,00000000,00000000,?,00000000,00000008,?,00414680,00424798,000000FE,?,00411653,WQL), ref: 00413CD9
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00411653,?,00000000,00000000,?,00414680,00424798,000000FE,?,00411653), ref: 00413D54
                                                • SysAllocString.OLEAUT32(00000000), ref: 00413D5F
                                                • _com_issue_error.COMSUPP ref: 00413D88
                                                • _com_issue_error.COMSUPP ref: 00413D92
                                                • GetLastError.KERNEL32(80070057,?,00000000,00000008,?,00414680,00424798,000000FE,?,00411653,WQL), ref: 00413D97
                                                • _com_issue_error.COMSUPP ref: 00413DAA
                                                • GetLastError.KERNEL32(00000000,?,00414680,00424798,000000FE,?,00411653,WQL,?,?,?,?,?,?,?,00000000), ref: 00413DC0
                                                • _com_issue_error.COMSUPP ref: 00413DD3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                • String ID:
                                                • API String ID: 1353541977-0
                                                • Opcode ID: f41af25578efc29595986d2abd5c4557e3d975c5f5e72a05fad108283b35a71f
                                                • Instruction ID: 91591ea8f3ca65aa41be0f87e43bea3bc54f9acd7f89503e693b53a03cfc1328
                                                • Opcode Fuzzy Hash: f41af25578efc29595986d2abd5c4557e3d975c5f5e72a05fad108283b35a71f
                                                • Instruction Fuzzy Hash: 1C41F672A00219ABCB109F65D845BEFBBA8AB48715F14422FF515E7380D7389A8087E8
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040B7CF
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                  • Part of subcall function 0040BD99: __EH_prolog3_GS.LIBCMT ref: 0040BDA3
                                                Strings
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo:, xrefs: 0040B897, 0040B9AA
                                                • , strCmd:, xrefs: 0040B99E
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B86F, 0040B87E, 0040B8FD, 0040B98C
                                                • [CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo find_first_of STR_VBS_IPC_PARAMETER_DIVIDER failed! strVBSIPCInfo:, xrefs: 0040B916
                                                • VBSGetSliderCount, xrefs: 0040B9FC
                                                • VBSConvertProgress, xrefs: 0040BA1F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$ProtectVirtual
                                                • String ID: , strCmd:$VBSConvertProgress$VBSGetSliderCount$[CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo find_first_of STR_VBS_IPC_PARAMETER_DIVIDER failed! strVBSIPCInfo:$[CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 624373510-2640463817
                                                • Opcode ID: 4c79963274a99e6e87e80073ed61d85432a18d6ec956ebc9e7b6fdb969bcb2dc
                                                • Instruction ID: 95473a93403c734b4744852b84c608a8a78e287613164ef3d788b91043617ffc
                                                • Opcode Fuzzy Hash: 4c79963274a99e6e87e80073ed61d85432a18d6ec956ebc9e7b6fdb969bcb2dc
                                                • Instruction Fuzzy Hash: 50716B72A00208AFDB05EB65DC69ADD7B75EF08314F1480AEE506A72E1DF385E85CB5C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040233A
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00402569
                                                Strings
                                                • [CDocConvert::::HandleIPC_ImgCancelConvertRequest] strTaskID:, xrefs: 00402377
                                                • [CDocConvert::HandleIPC_ImgCancelConvertRequest] strTaskID:, xrefs: 00402508
                                                • , hProcess:, xrefs: 00402503
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 0040235B, 004024E0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3H_prolog3_ProcessProtectTerminateVirtual
                                                • String ID: , hProcess:$[CDocConvert::::HandleIPC_ImgCancelConvertRequest] strTaskID:$[CDocConvert::HandleIPC_ImgCancelConvertRequest] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1443114193-3907194096
                                                • Opcode ID: 62c1d0d3a1d2aa6c8f8c39956a4fa7234f39c7e915bfc192421f75184da31638
                                                • Instruction ID: df8e3d83f7ba511f450b37bb38ee689344465493e2f3a48e0635173aeccd5823
                                                • Opcode Fuzzy Hash: 62c1d0d3a1d2aa6c8f8c39956a4fa7234f39c7e915bfc192421f75184da31638
                                                • Instruction Fuzzy Hash: 85814B70A00305AFCB04DFA4D999BEEBBB4BF08314F10816EE515A72D1DB78AA45CB59
                                                APIs
                                                • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?), ref: 0040EABC
                                                • EnterCriticalSection.KERNEL32(?), ref: 0040EAF6
                                                • LeaveCriticalSection.KERNEL32(?), ref: 0040EB32
                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 0040EB66
                                                • WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 0040EB8D
                                                • FlushFileBuffers.KERNEL32(?), ref: 0040EB9C
                                                • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 0040EC65
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: File$CriticalMultipleObjectsSectionWait$BuffersEnterFlushLeavePointerWrite
                                                • String ID:
                                                • API String ID: 212290116-0
                                                • Opcode ID: 0c28ca6caadaf3cd7fd16936cff9f9c79cba6f6055e8f539de9031ddcb989b14
                                                • Instruction ID: e57b76790d50655fa2c6df5fcb4680fefcc05084cd1c1b2089238f56aaf1b74d
                                                • Opcode Fuzzy Hash: 0c28ca6caadaf3cd7fd16936cff9f9c79cba6f6055e8f539de9031ddcb989b14
                                                • Instruction Fuzzy Hash: CE615A71A00208AFDB14CFA9DD95BEEBBF4FB48310F14453AE916EB290D77469408B54
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 004020CA
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                  • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                Strings
                                                • strImgFolderPath:, xrefs: 00402188
                                                • strDocFilePath:, xrefs: 0040218D
                                                • [CDocConvert::::HandleIPC_ImgStartConvertRequest] strTaskID:, xrefs: 00402192
                                                • strImgFormat:, xrefs: 00402183
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402160
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$ProtectVirtual
                                                • String ID: strImgFolderPath:$ strDocFilePath:$ strImgFormat:$[CDocConvert::::HandleIPC_ImgStartConvertRequest] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 624373510-391708754
                                                • Opcode ID: b347c1ec5e03e1f920b73b53c7eff73245ed50fb2dbedb36dde4246b0f2a28a8
                                                • Instruction ID: 4298c3ca66f6c55349da1e56c2f7dc802e2da2487d28eea6cf766b38ea9a3579
                                                • Opcode Fuzzy Hash: b347c1ec5e03e1f920b73b53c7eff73245ed50fb2dbedb36dde4246b0f2a28a8
                                                • Instruction Fuzzy Hash: BC61793194021A9FCB24DF64D895BEDB7B1EF48314F1040AEE54AA3291DB74AE85CF08
                                                APIs
                                                • __EH_prolog3_GS.LIBCMT ref: 0040331F
                                                  • Part of subcall function 0040385C: __EH_prolog3_GS.LIBCMT ref: 00403866
                                                • Sleep.KERNEL32(00000028), ref: 004034AE
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::::ConvertDocThreadFunc] InitPPTApp failed ! exit thread!, xrefs: 004033DC
                                                • [CDocConvert::ConvertDocThreadFunc] bInit: , xrefs: 00403364
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403347, 004033BC, 004034FB
                                                • [CDocConvert::::ConvertDocThreadFunc] End! Exit thread!, xrefs: 00403521
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3_$ProtectSleepVirtual
                                                • String ID: [CDocConvert::::ConvertDocThreadFunc] End! Exit thread!$[CDocConvert::::ConvertDocThreadFunc] InitPPTApp failed ! exit thread!$[CDocConvert::ConvertDocThreadFunc] bInit: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 2544358551-2000447865
                                                • Opcode ID: 0cf408eb4a5164c052d667c61260c2e33cb84e120fbb79ec39a0b8052d1349c6
                                                • Instruction ID: fc12af958fceb45b22afabc9c8cc1d154353b66f118d34e3f76e0e89f02dc691
                                                • Opcode Fuzzy Hash: 0cf408eb4a5164c052d667c61260c2e33cb84e120fbb79ec39a0b8052d1349c6
                                                • Instruction Fuzzy Hash: 2D518F31904704AFEB14EF61CC9ABD9BBB5EB04315F1084AEE40AA61E1DB785E84CF19
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040B3C4
                                                  • Part of subcall function 0040B6A9: __EH_prolog3.LIBCMT ref: 0040B6B3
                                                Strings
                                                • , message size = , xrefs: 0040B463
                                                • [CDocConvertVbsIPCServer::PumpMessage] msg._message is NULL! return!, xrefs: 0040B56C
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B43D, 0040B4D3, 0040B54B
                                                • [CDocConvertVbsIPCServer::PumpMessage] i = , xrefs: 0040B471
                                                • [CDocConvertVbsIPCServer::PumpMessage] m_SaftyMessageVector is NULL! return!, xrefs: 0040B4F3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3
                                                • String ID: , message size = $[CDocConvertVbsIPCServer::PumpMessage] i = $[CDocConvertVbsIPCServer::PumpMessage] m_SaftyMessageVector is NULL! return!$[CDocConvertVbsIPCServer::PumpMessage] msg._message is NULL! return!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 431132790-2754882026
                                                • Opcode ID: 89dec19caac37b4c8b580c3a910641b03a2b4ef723a527013792012bb428126b
                                                • Instruction ID: 180f00dd34122d70fab5881e58e1ba8803f1677b7fbebd3ec06e2c8a7cebe460
                                                • Opcode Fuzzy Hash: 89dec19caac37b4c8b580c3a910641b03a2b4ef723a527013792012bb428126b
                                                • Instruction Fuzzy Hash: 1D51AD71A41304ABDB149BA0DD5ABAD77B0EF44324F64457EE406B62E1CF7C5E818A4C
                                                APIs
                                                • GetCurrentProcessId.KERNEL32(?,004270B0), ref: 0040E0FC
                                                • EnterCriticalSection.KERNEL32(?), ref: 0040E165
                                                • LeaveCriticalSection.KERNEL32(?,?,?), ref: 0040E199
                                                • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0040E1A9
                                                Strings
                                                • loaded by , xrefs: 0040E0C6
                                                • didn't pass the verification, error code , xrefs: 0040E128
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CriticalSection$CurrentEnterLeaveProcessReleaseSemaphore
                                                • String ID: didn't pass the verification, error code $ loaded by
                                                • API String ID: 61496330-2439791217
                                                • Opcode ID: 3c26809dd974048e095aac905a104eef7292435528225e789fd9183ae77c5755
                                                • Instruction ID: b52a9aa818815cb245682506643f326b322c2aa792aca06c5a04712bf6ea24bb
                                                • Opcode Fuzzy Hash: 3c26809dd974048e095aac905a104eef7292435528225e789fd9183ae77c5755
                                                • Instruction Fuzzy Hash: 3D519271A00209EBCB14DB75DC59BEEB7B5FB44304F00867AF41AA7291DB386D94CB98
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 004026EA
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::HandleIPC_VBSIPCPageNumberMessage] SendImgStartConvertResponse strTaskID:, xrefs: 004027BE
                                                • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCPageNumberMessage] m_ipcSender is NULL!, xrefs: 0040272C
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402710, 00402790
                                                • , m_strImgFolderPath:, xrefs: 004027A9
                                                • , uPageShowNumTotal:, xrefs: 004027AF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: , m_strImgFolderPath:$, uPageShowNumTotal:$[CDocConvert::HandleIPC_VBSIPCPageNumberMessage] SendImgStartConvertResponse strTaskID:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCPageNumberMessage] m_ipcSender is NULL!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1809373692-2569159283
                                                • Opcode ID: 52bf61267d8c5c46e6bcbc487db2412ca6a1e92767f63a18dccdb58333a4c9ae
                                                • Instruction ID: 0ca3b86902d35b3fc8ab79bdec02e4fe5fcab68b8c9d7db7cc2c30c71c6b3825
                                                • Opcode Fuzzy Hash: 52bf61267d8c5c46e6bcbc487db2412ca6a1e92767f63a18dccdb58333a4c9ae
                                                • Instruction Fuzzy Hash: 4631AD31A40301AADB14AB64DC5AFEA3765EF48724F24843FF405AB2D2DFB95D82861C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040B02A
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvertVbsIPCServer::UnInit], xrefs: 0040B068
                                                • [CDocConvertVbsIPCServer::UnInit] is_inited_ is CmmFalse, don't need UnInit!, xrefs: 0040B0D0
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B04B, 0040B0B3, 0040B16B
                                                • [CDocConvertVbsIPCServer::UnInit] Delete Message:, xrefs: 0040B18D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvertVbsIPCServer::UnInit]$[CDocConvertVbsIPCServer::UnInit] Delete Message:$[CDocConvertVbsIPCServer::UnInit] is_inited_ is CmmFalse, don't need UnInit!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 1809373692-2342135638
                                                • Opcode ID: b39599eb63ae4a81e3128a8b4f6e4b531e4c273926c53cb63883c52ee9c3c8a1
                                                • Instruction ID: aee573a8e460fd3a8d9e1b5fd3a726836f595948baa831e83ee989bba385e238
                                                • Opcode Fuzzy Hash: b39599eb63ae4a81e3128a8b4f6e4b531e4c273926c53cb63883c52ee9c3c8a1
                                                • Instruction Fuzzy Hash: 2751AD31A40715ABDB149BA0DC6ABDE7B70FF08721F10456EE511BB2D1CB785A81CB9C
                                                APIs
                                                  • Part of subcall function 0041433A: EnterCriticalSection.KERNEL32(0042CA60,0042D2F0,?,?,0040C122,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 00414345
                                                  • Part of subcall function 0041433A: LeaveCriticalSection.KERNEL32(0042CA60,?,0040C122,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 00414382
                                                • GetCurrentProcess.KERNEL32(?,?), ref: 00412C87
                                                • IsWow64Process.KERNEL32(00000000), ref: 00412C8E
                                                • RegGetValueW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,20010002,00000000,?,00000800), ref: 00412CED
                                                Strings
                                                • SOFTWARE\Microsoft\Windows\CurrentVersion, xrefs: 00412CE3
                                                • ProgramFilesDir, xrefs: 00412CDE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CriticalProcessSection$CurrentEnterLeaveValueWow64
                                                • String ID: ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
                                                • API String ID: 623438262-1909746267
                                                • Opcode ID: 8fc0ced0edc39a80b657f3c0fe8d7c359c6e872b154f47451c3c70d2233b6898
                                                • Instruction ID: c3a08843d0d200cdbd3d1b2bcfc247f2eb322f66e650b1e7f1c13803f4fdb81c
                                                • Opcode Fuzzy Hash: 8fc0ced0edc39a80b657f3c0fe8d7c359c6e872b154f47451c3c70d2233b6898
                                                • Instruction Fuzzy Hash: 1641D070E003489ACB20DF54ED46BEA73B8BB04704F54817AE815D7290DBB85986CF9D
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00401FBA
                                                • ExitProcess.KERNEL32 ref: 004020AC
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::OnChannelError], ExitProcess!, xrefs: 00402079
                                                • [CDocConvert::OnChannelError], xrefs: 00401FF2
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00401FD6, 0040205A
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExitH_prolog3ProcessProtectVirtual
                                                • String ID: [CDocConvert::OnChannelError]$[CDocConvert::OnChannelError], ExitProcess!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 4229167784-679568407
                                                • Opcode ID: e49edd9864abbb3d87022385eb2d413356123a37627d111662b963a51c2ee4bf
                                                • Instruction ID: 38f8ae0ac911da3a7bdad0eb44c8cb60196c5a814a9daa41f359f780c9d3694f
                                                • Opcode Fuzzy Hash: e49edd9864abbb3d87022385eb2d413356123a37627d111662b963a51c2ee4bf
                                                • Instruction Fuzzy Hash: 1B217C31A40700ABD7149BA0DD6ABDD3B70EB48710F20857EF116AA1E1DFB80D80CA1C
                                                APIs
                                                • GetModuleHandleA.KERNEL32(ntdll.dll,LdrUnregisterDllNotification), ref: 0040CE49
                                                • GetProcAddress.KERNEL32(00000000), ref: 0040CE50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: LdrUnregisterDllNotification$ntdll.dll
                                                • API String ID: 1646373207-237666150
                                                • Opcode ID: 081667f065d189619943f997a0d6da2d81fd1828666de2e48ae92a57e87b70f4
                                                • Instruction ID: 536fe45db68da839303e439799dd04e2e917962dd37583a1d3a7b1c71cf5fa9c
                                                • Opcode Fuzzy Hash: 081667f065d189619943f997a0d6da2d81fd1828666de2e48ae92a57e87b70f4
                                                • Instruction Fuzzy Hash: 4C61C271700503ABD70C9B38D9A9BFAF7A6FF44344F144339E419876D1CB7969A48B88
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040B5CA
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvertVbsIPCServer::OnMessageReceived] type:, xrefs: 0040B640
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B603
                                                • len:, xrefs: 0040B635
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: len:$[CDocConvertVbsIPCServer::OnMessageReceived] type:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 1809373692-2074319829
                                                • Opcode ID: 7471e48e2191e7f2eaa4730c6ef17b238e8e97372ab509c97a8fa65b74d9358d
                                                • Instruction ID: 806908c14e0dff88c04ca793e9a98def4ac357006f8ff3ba3248fcedc08ac92e
                                                • Opcode Fuzzy Hash: 7471e48e2191e7f2eaa4730c6ef17b238e8e97372ab509c97a8fa65b74d9358d
                                                • Instruction Fuzzy Hash: C6216271A00305ABCB049FA4D855ADD7775FF48320F14856EE859AB2D0CB789D81CB8C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00402FBF
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                • Sleep.KERNEL32(00000028), ref: 00403089
                                                Strings
                                                • [CDocConvert::DetectThreadFunc], xrefs: 00402FF9
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402FDD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectSleepVirtual
                                                • String ID: [CDocConvert::DetectThreadFunc]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 4201259014-756957823
                                                • Opcode ID: f8e9f0e23968f2bed3d0544a53d068131b256cc9dfe19466c324953f8a7454e9
                                                • Instruction ID: 5e14cf88f44ae6e4a5dcb5661d55ffe10a5308fbadb8cd52eea9f61d4dc41f69
                                                • Opcode Fuzzy Hash: f8e9f0e23968f2bed3d0544a53d068131b256cc9dfe19466c324953f8a7454e9
                                                • Instruction Fuzzy Hash: F4219D30A01305EBDB04DF60CD5ABDCBAB4BB08315F50827EE41AA32E2CB785E45CA18
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040C1FA
                                                • PostThreadMessageW.USER32(00000012,00000000,00000000), ref: 0040C26B
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [ConsoleCtrlhandler] CTRL_CLOSE_EVENT, xrefs: 0040C235
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\main.cpp, xrefs: 0040C219
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3MessagePostProtectThreadVirtual
                                                • String ID: [ConsoleCtrlhandler] CTRL_CLOSE_EVENT$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\main.cpp
                                                • API String ID: 2106445864-3568867012
                                                • Opcode ID: 6af0ed5f76dcea0df63856a0bd80fcc9152b90093d9c2031062d343886322e88
                                                • Instruction ID: 8af0f1432a38c39ac156a390085beae4290296724a84b2e37cf92d230908f7e1
                                                • Opcode Fuzzy Hash: 6af0ed5f76dcea0df63856a0bd80fcc9152b90093d9c2031062d343886322e88
                                                • Instruction Fuzzy Hash: 0601AD35A80304AAEB10ABA0CC9BFDA3670FF00705F10457EF501AA1D2CBB81D81CA1C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 004025EA
                                                • ExitProcess.KERNEL32 ref: 00402653
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::HandleIPC_ImgExitProcessRequest] Recv CSBMBMessage_Doc2ImgExitProcessRequest, ExitProcess!, xrefs: 00402622
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402606
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ExitH_prolog3ProcessProtectVirtual
                                                • String ID: [CDocConvert::HandleIPC_ImgExitProcessRequest] Recv CSBMBMessage_Doc2ImgExitProcessRequest, ExitProcess!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 4229167784-399022842
                                                • Opcode ID: 68303deaeca0f61a469608444ec6b09118350651f39741b9a461f4fb4062dba4
                                                • Instruction ID: 558ee970a2adf4e1fc46f8a3af44374caa6ca941988eab47a0cb853e066b6c20
                                                • Opcode Fuzzy Hash: 68303deaeca0f61a469608444ec6b09118350651f39741b9a461f4fb4062dba4
                                                • Instruction Fuzzy Hash: 2BF04931A80304AAE704AFA4DC6ABDD7670FB04711F10487EF102AA1E1CBB84D80CA1C
                                                APIs
                                                • GetModuleHandleW.KERNEL32(zCrashReport.dll,0040C2C8,?,000001B0), ref: 004121E5
                                                • GetProcAddress.KERNEL32(00000000,crSetCrashCallbackW), ref: 004121F5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: crSetCrashCallbackW$zCrashReport.dll
                                                • API String ID: 1646373207-1811286062
                                                • Opcode ID: bb35c2366ebe50ab0f96784bce2b4b31de44ffc2a4ef195703e2f7f4e33b945d
                                                • Instruction ID: 788238c6706ea16a2eee1a96d51a96658a6dcae04bbc94478e2843e4b5f40ba0
                                                • Opcode Fuzzy Hash: bb35c2366ebe50ab0f96784bce2b4b31de44ffc2a4ef195703e2f7f4e33b945d
                                                • Instruction Fuzzy Hash: 52D0123838130225DD1027B26E09FCE26042B40F11F644AA2B831E11D5EBFCC591502D
                                                APIs
                                                • OpenProcess.KERNEL32(00000001,00000000,00000000,00000000,?), ref: 00411267
                                                • GetLastError.KERNEL32 ref: 00411273
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: ErrorLastOpenProcess
                                                • String ID:
                                                • API String ID: 919517065-0
                                                • Opcode ID: 180b963629b25771218858fb9be680c45ebcaf4e685314d94568f095a85c1d83
                                                • Instruction ID: df430542db87c27eb6bb0a20753aa050ff356964e4e46c6d4fd600331b1f44f8
                                                • Opcode Fuzzy Hash: 180b963629b25771218858fb9be680c45ebcaf4e685314d94568f095a85c1d83
                                                • Instruction Fuzzy Hash: E031F871E002099BDB14DFA8DC957EEB7B5EF48304F5442AAE905F7290DB749E80CB94
                                                APIs
                                                • EnterCriticalSection.KERNEL32(0042CA60,?,?,0040C13C,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004142FA
                                                • LeaveCriticalSection.KERNEL32(0042CA60,?,0040C13C,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 0041432D
                                                • SetEvent.KERNEL32(?,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004143AE
                                                • ResetEvent.KERNEL32(?,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004143BA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CriticalEventSection$EnterLeaveReset
                                                • String ID:
                                                • API String ID: 3553466030-0
                                                • Opcode ID: 011063dab18d76bc8b03866032b575e26ed5f704ee7c2b09c1e2fe64b6e0426c
                                                • Instruction ID: e09fd4ba703b3f4f90ed7c4f0adbe9ef2044be7fde56f23161c9f76c561368eb
                                                • Opcode Fuzzy Hash: 011063dab18d76bc8b03866032b575e26ed5f704ee7c2b09c1e2fe64b6e0426c
                                                • Instruction Fuzzy Hash: 9001F636B41528EFCB25EF18FC98AD97BA5EB49751B41807AE90297320CB345C029B9C
                                                APIs
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 004109E7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_task
                                                • String ID: }A$m@
                                                • API String ID: 118556049-736616827
                                                • Opcode ID: c679fcf57494bb239db96a3548e4c720a31c8a11289dfd5385f4546d284e78a0
                                                • Instruction ID: c3dfcaa805bbc8a51e55aaabc3e4a89111bc7eceac5f2a1566f87b27f93fef33
                                                • Opcode Fuzzy Hash: c679fcf57494bb239db96a3548e4c720a31c8a11289dfd5385f4546d284e78a0
                                                • Instruction Fuzzy Hash: D051C3B2A001099FDB08DF69C991AEEB7F5EF88300F14812AE506D7351D778AD95CB94
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00401C97
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::CDocConvert], xrefs: 00401DF8
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00401DDB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvert::CDocConvert]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1809373692-1479113695
                                                • Opcode ID: d8c234d8f344c7166d2f66105d34b04a422d9a5bfd5bf7b32b886f0fdc852b4e
                                                • Instruction ID: a40a2f0a47e0f672c9afa67fb71f5c4737df055ac14e51e82bc3df37677841b0
                                                • Opcode Fuzzy Hash: d8c234d8f344c7166d2f66105d34b04a422d9a5bfd5bf7b32b886f0fdc852b4e
                                                • Instruction Fuzzy Hash: E85125B0900742EFD704DF25C999789FFF0BF18304F50856ED14AA7292DB78AA94CB99
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00403258
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::CreateConvertThread] bRet: , xrefs: 004032BA
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403299
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvert::CreateConvertThread] bRet: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1809373692-452567957
                                                • Opcode ID: 99adcce184ba34fee4a85432692fe05538fd99e2266a5797d6a7ab14f0574b05
                                                • Instruction ID: adf8f5ce9188c4b8668094b64460cc229a608b819f9a05dea54ebcbb5ebed4ec
                                                • Opcode Fuzzy Hash: 99adcce184ba34fee4a85432692fe05538fd99e2266a5797d6a7ab14f0574b05
                                                • Instruction Fuzzy Hash: D4117971A40315ABDB04AFA4DC56AEE7AA8EB04315F50447EF402B72D1CB785E818AAC
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 00402EF6
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • [CDocConvert::CreateDetectThread] bRet: , xrefs: 00402F58
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402F37
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvert::CreateDetectThread] bRet: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1809373692-1270373286
                                                • Opcode ID: f36e3a4818fa31f1cf2a13d5cc227d8049b27aa70c011b65117d2f714605032c
                                                • Instruction ID: 0d6e37797b63617483badd5a7fd61e6ecb8421c5efb43924a2aa00c28a8240d4
                                                • Opcode Fuzzy Hash: f36e3a4818fa31f1cf2a13d5cc227d8049b27aa70c011b65117d2f714605032c
                                                • Instruction Fuzzy Hash: B111A9B1A41316ABDB04AF60DD5ABEE76B8EF04311F50447EF402F72D1CAB85D808A6C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040B221
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B2AE
                                                • [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer], xrefs: 0040B2CB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 1809373692-330505927
                                                • Opcode ID: 2fd0d4eb773c3e8d501f0b16aa810d208dbfdecc74343adaf8774b261c04853f
                                                • Instruction ID: 00befacb907631c9e17a7b3fa5999c24b6eceef9975b5f24643841f7cb668f1b
                                                • Opcode Fuzzy Hash: 2fd0d4eb773c3e8d501f0b16aa810d208dbfdecc74343adaf8774b261c04853f
                                                • Instruction Fuzzy Hash: 3C1167B0E003109FD7149F65EC5A6A87BB1FB08304FA084BEE005A76A0CBB80991CB0E
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040B6B3
                                                  • Part of subcall function 0040B020: __EH_prolog3.LIBCMT ref: 0040B02A
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B6F8
                                                • [CDocConvertVbsIPCServer::HandleConnectingTimeout] connecting timeout., xrefs: 0040B714
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3$ProtectVirtual
                                                • String ID: [CDocConvertVbsIPCServer::HandleConnectingTimeout] connecting timeout.$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                • API String ID: 3007236580-901364601
                                                • Opcode ID: e35b6af78b42fc06780ffa3eb587207b71c6ccf129391efccff88d3d12cf072f
                                                • Instruction ID: a9d0bb768643340a5ea1168fb03230a697b43f5db5e869853af32c9bcaec17c0
                                                • Opcode Fuzzy Hash: e35b6af78b42fc06780ffa3eb587207b71c6ccf129391efccff88d3d12cf072f
                                                • Instruction Fuzzy Hash: 4A018871940700AADB28AF61CCA7AEA7260EB44714F50457FE442A76E2DBBC5C81CA5C
                                                APIs
                                                • __EH_prolog3.LIBCMT ref: 0040266A
                                                  • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                Strings
                                                • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402686
                                                • [CDocConvert::OnIPCServerChannelError], xrefs: 004026A2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: H_prolog3ProtectVirtual
                                                • String ID: [CDocConvert::OnIPCServerChannelError]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                • API String ID: 1809373692-3070404389
                                                • Opcode ID: 4ca598820c89b7f3b870ffea1a173ab30c14d89fcf2580a0d6d755e8ac5f4b0c
                                                • Instruction ID: 35197b002a70b5b2eeeaaf07b04524d3dbd07c7745c84826511f01a8e825cf61
                                                • Opcode Fuzzy Hash: 4ca598820c89b7f3b870ffea1a173ab30c14d89fcf2580a0d6d755e8ac5f4b0c
                                                • Instruction Fuzzy Hash: 6EF01771980345AAE714AB64DD5BBDD3664EB04714F60487EE401AA2E1CBBC5DC18A1C
                                                APIs
                                                  • Part of subcall function 00401B22: InitializeCriticalSectionEx.KERNEL32(0042CA0C,00000000,00000000,0042C9F8,00413BB5,?,?,?,004019CA), ref: 00401B28
                                                  • Part of subcall function 00401B22: GetLastError.KERNEL32(?,?,?,004019CA), ref: 00401B32
                                                • IsDebuggerPresent.KERNEL32(?,?,?,004019CA), ref: 00413BB9
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,004019CA), ref: 00413BC8
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00413BC3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 3511171328-631824599
                                                • Opcode ID: 199956a563438f3586a61a4a6f19ccc57f1881164043d3a7314101558bc9cb29
                                                • Instruction ID: 8b65f71d81d517f14160c623eaecbed840306f26d5a6cb6b6d2c6e55611105c0
                                                • Opcode Fuzzy Hash: 199956a563438f3586a61a4a6f19ccc57f1881164043d3a7314101558bc9cb29
                                                • Instruction Fuzzy Hash: 47E065702047108BC3309F25E9143827AE4AF04709F00887FE456D2291E7B8FA84CB59
                                                APIs
                                                • GetProcessHeap.KERNEL32 ref: 0040E679
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040E680
                                                  • Part of subcall function 0040F130: GetCurrentProcess.KERNEL32(?,?,?,?,?,?), ref: 0040F17E
                                                  • Part of subcall function 0040F130: GetMappedFileNameW.PSAPI(00000000,?,?,?), ref: 0040F185
                                                  • Part of subcall function 0040F130: GetLogicalDriveStringsW.KERNEL32(00000103,?,?,?,?,?,?,?), ref: 0040F1DA
                                                  • Part of subcall function 0040F130: QueryDosDeviceW.KERNEL32(00000FA0,?,00000103,?,?,?,?,?,?), ref: 0040F214
                                                • GetProcessHeap.KERNEL32(00000000,00000FA0,?,?,00000001), ref: 0040E6E4
                                                • HeapFree.KERNEL32(00000000), ref: 0040E6EB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocCurrentDeviceDriveFileFreeLogicalMappedNameQueryStrings
                                                • String ID:
                                                • API String ID: 1064646199-0
                                                • Opcode ID: 0c5f043bf4b246922cf2179a9f600e16eea6433679b903cdfe6c1f12932328f2
                                                • Instruction ID: 2668c3dfdd3c3276348bbd43bb132a3e152f58a801efa895f745a1c07ca89cb8
                                                • Opcode Fuzzy Hash: 0c5f043bf4b246922cf2179a9f600e16eea6433679b903cdfe6c1f12932328f2
                                                • Instruction Fuzzy Hash: C811D034104301EBCB249F62D884BAB77A8AF44755F40CD2EFD55972E0DBB5A824CB5A
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000000,?,00000000,0040DAF3), ref: 0040D7E0
                                                • HeapFree.KERNEL32(00000000), ref: 0040D7E7
                                                • GetProcessHeap.KERNEL32(00000000,?,00000000,0040DAF3), ref: 0040D800
                                                • HeapFree.KERNEL32(00000000), ref: 0040D807
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1460616324.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.1460562436.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460795421.0000000000419000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460825244.000000000042B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460894634.000000000042C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460925585.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460948115.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1460982365.0000000000435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461029107.0000000000436000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461057031.000000000043A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461097335.0000000000465000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461137088.000000000048A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461220451.000000000051D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461250705.0000000000524000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461391005.000000000060E000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000615000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000618000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.0000000000657000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461441854.00000000006DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461772858.00000000006EB000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.00000000006EE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000004.00000002.1461798678.000000000071F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_MicrosoftOfficeWord.jbxd
                                                Similarity
                                                • API ID: Heap$FreeProcess
                                                • String ID:
                                                • API String ID: 3859560861-0
                                                • Opcode ID: 1c561bf052e99d539f3441f41995ab45b4dfc28fc98b83e691970e21491ed14b
                                                • Instruction ID: 5d4cdb0425c937855427814b3bc534e629d3b797dcae5c9850f92b4c5cd28c0b
                                                • Opcode Fuzzy Hash: 1c561bf052e99d539f3441f41995ab45b4dfc28fc98b83e691970e21491ed14b
                                                • Instruction Fuzzy Hash: 4BF054B57002109BD7349F94EE58BDA7778B75C702F418939EC01935A4CB7C881A875A

                                                Execution Graph

                                                Execution Coverage:11.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:5.3%
                                                Total number of Nodes:76
                                                Total number of Limit Nodes:3
                                                execution_graph 35386 5a1c7a0 35388 5a1c7b3 35386->35388 35390 5a1c858 35388->35390 35391 5a1c8a0 VirtualProtect 35390->35391 35393 5a1c83b 35391->35393 35398 9d151c0 35399 9d151c5 35398->35399 35402 9d15513 35399->35402 35411 9d15509 35399->35411 35404 9d15517 35402->35404 35403 9d1556f 35403->35399 35404->35403 35420 9e7fa78 35404->35420 35426 9e7fa88 35404->35426 35432 9e7fa50 35404->35432 35443 9e7f1d8 35404->35443 35449 9e7f188 35404->35449 35459 9e43925 35404->35459 35413 9d15512 35411->35413 35412 9d1556f 35412->35399 35413->35399 35413->35412 35414 9e43925 3 API calls 35413->35414 35415 9e7fa50 4 API calls 35413->35415 35416 9e7fa88 4 API calls 35413->35416 35417 9e7fa78 4 API calls 35413->35417 35418 9e7f1d8 4 API calls 35413->35418 35419 9e7f188 4 API calls 35413->35419 35414->35413 35415->35413 35416->35413 35417->35413 35418->35413 35419->35413 35422 9e7fa87 35420->35422 35421 9e7fb26 KiUserExceptionDispatcher 35421->35422 35422->35421 35423 9d1fbb1 LdrInitializeThunk 35422->35423 35424 9d1fac0 LdrInitializeThunk 35422->35424 35425 9d1fab0 LdrInitializeThunk 35422->35425 35423->35422 35424->35422 35425->35422 35428 9e7fa93 35426->35428 35427 9e7fb26 KiUserExceptionDispatcher 35427->35428 35428->35427 35429 9d1fbb1 LdrInitializeThunk 35428->35429 35430 9d1fac0 LdrInitializeThunk 35428->35430 35431 9d1fab0 LdrInitializeThunk 35428->35431 35429->35428 35430->35428 35431->35428 35433 9e7fad7 35432->35433 35434 9e7fa5f 35432->35434 35436 9e7fa93 35433->35436 35465 9d1fbb1 35433->35465 35469 9d1fab0 35433->35469 35473 9d1fac0 35433->35473 35434->35404 35435 9e7fb26 KiUserExceptionDispatcher 35435->35436 35436->35435 35440 9d1fbb1 LdrInitializeThunk 35436->35440 35441 9d1fac0 LdrInitializeThunk 35436->35441 35442 9d1fab0 LdrInitializeThunk 35436->35442 35440->35436 35441->35436 35442->35436 35445 9e7fa93 35443->35445 35444 9e7fb26 KiUserExceptionDispatcher 35444->35445 35445->35444 35446 9d1fbb1 LdrInitializeThunk 35445->35446 35447 9d1fac0 LdrInitializeThunk 35445->35447 35448 9d1fab0 LdrInitializeThunk 35445->35448 35446->35445 35447->35445 35448->35445 35450 9e7fb4e 35449->35450 35458 9e7fa93 35449->35458 35452 9d1fbb1 LdrInitializeThunk 35450->35452 35453 9d1fac0 LdrInitializeThunk 35450->35453 35454 9d1fab0 LdrInitializeThunk 35450->35454 35451 9e7fb26 KiUserExceptionDispatcher 35451->35458 35452->35458 35453->35458 35454->35458 35455 9d1fac0 LdrInitializeThunk 35455->35458 35456 9d1fab0 LdrInitializeThunk 35456->35458 35457 9d1fbb1 LdrInitializeThunk 35457->35458 35458->35451 35458->35455 35458->35456 35458->35457 35460 9e4393b 35459->35460 35462 9d1fbb1 LdrInitializeThunk 35460->35462 35463 9d1fac0 LdrInitializeThunk 35460->35463 35464 9d1fab0 LdrInitializeThunk 35460->35464 35461 9e4395c 35462->35461 35463->35461 35464->35461 35467 9d1fb2a 35465->35467 35466 9d1fb78 LdrInitializeThunk 35468 9d1fb8e 35466->35468 35467->35466 35467->35468 35468->35436 35471 9d1fabf 35469->35471 35470 9d1fb78 LdrInitializeThunk 35472 9d1fb8e 35470->35472 35471->35470 35471->35472 35472->35436 35476 9d1fae2 35473->35476 35474 9d1fb78 LdrInitializeThunk 35475 9d1fb8e 35474->35475 35475->35436 35476->35474 35476->35475 35394 5a1ca08 35395 5a1ca48 CloseHandle 35394->35395 35397 5a1ca79 35395->35397

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 651 9d1fac0-9d1fadd 652 9d1fae2-9d1fae5 651->652 653 9d1fd44-9d1fd4d 652->653 654 9d1faeb 652->654 654->653 655 9d1fd70-9d1fd8a 654->655 656 9d1fbf3-9d1fc06 654->656 657 9d1faf2-9d1fb28 654->657 658 9d1fd15-9d1fd29 654->658 659 9d1fb36 654->659 660 9d1fb78-9d1fb89 LdrInitializeThunk 654->660 661 9d1fcc3 654->661 662 9d1fb62-9d1fb6f 654->662 663 9d1fbc6-9d1fbd6 654->663 664 9d1fc49 654->664 665 9d1fca9-9d1fcbd 654->665 666 9d1fc2c-9d1fc40 654->666 667 9d1fd2f-9d1fd30 654->667 668 9d1fd4e-9d1fd5c 654->668 655->652 669 9d1fd90 655->669 670 9d1fc08-9d1fc0c 656->670 657->662 699 9d1fb2a-9d1fb2d 657->699 677 9d1fd09-9d1fd0c 658->677 694 9d1fd2b-9d1fd2d 658->694 673 9d1fb3e-9d1fb40 659->673 678 9d1fb8e-9d1fbaf 660->678 661->677 662->659 691 9d1fb71-9d1fb76 662->691 663->662 695 9d1fbd8-9d1fbe6 663->695 674 9d1fc9d-9d1fca0 664->674 665->674 690 9d1fcbf-9d1fcc1 665->690 685 9d1fc20-9d1fc23 666->685 686 9d1fc42-9d1fc47 666->686 667->653 701 9d1fd63-9d1fd6b 668->701 669->652 670->664 683 9d1fc0e-9d1fc1c 670->683 687 9d1fb42-9d1fb48 673->687 688 9d1fb58-9d1fb60 673->688 674->661 689 9d1fca2 674->689 677->667 692 9d1fd0e 677->692 678->670 683->685 696 9d1fc1e 683->696 685->666 702 9d1fc25 685->702 686->685 697 9d1fb4a 687->697 698 9d1fb4c-9d1fb4e 687->698 688->699 689->658 689->661 689->665 689->667 690->674 691->699 692->658 692->667 694->677 695->699 700 9d1fbec-9d1fbee 695->700 696->685 697->688 698->688 699->660 703 9d1fb2f 699->703 700->699 701->652 702->658 702->661 702->664 702->665 702->666 702->667 703->656 703->658 703->659 703->660 703->661 703->662 703->663 703->664 703->665 703->666 703->667
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531320779.0000000009D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d10000_csc.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 49f8c8ea48824fe86e49cdd6b4d050ee7053e548f142f2e61e8a1577b1051737
                                                • Instruction ID: 592c212b857f1de1b302300d36d716d548315d00b7e8b10b59416b5ab253c116
                                                • Opcode Fuzzy Hash: 49f8c8ea48824fe86e49cdd6b4d050ee7053e548f142f2e61e8a1577b1051737
                                                • Instruction Fuzzy Hash: 5B518F32A80604EFDB14CF6CE694BA977F3FB88310F248469E106A7A54DB349885DF45

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 706 9e7fa78-9e7fa8e 708 9e7fa93-9e7fa96 706->708 709 9e7fa9f-9e7faa5 708->709 710 9e7fa98 708->710 712 9e7faa9-9e7fad6 709->712 710->709 711 9e7fca3-9e7fcaa 710->711 710->712 711->709 713 9e7fcb0-9e7fcc1 711->713 743 9e7fad8 call 9d1fbb1 712->743 744 9e7fad8 call 9d1fac0 712->744 745 9e7fad8 call 9d1fab0 712->745 713->708 715 9e7fcc7 713->715 715->708 717 9e7fade-9e7fb84 KiUserExceptionDispatcher 751 9e7fb86 call 9d1fbb1 717->751 752 9e7fb86 call 9d1fac0 717->752 753 9e7fb86 call 9d1fab0 717->753 725 9e7fb8c-9e7fbe0 754 9e7fbe2 call 9d1fbb1 725->754 755 9e7fbe2 call 9d1fac0 725->755 756 9e7fbe2 call 9d1fab0 725->756 730 9e7fbe8-9e7fc39 746 9e7fc3b call 9d1fbb1 730->746 747 9e7fc3b call 9d1fac0 730->747 748 9e7fc3b call 9d1fab0 730->748 735 9e7fc41-9e7fc63 749 9e7fc65 call 9e43260 735->749 750 9e7fc65 call 9e43250 735->750 738 9e7fc6b-9e7fc75 740 9e7fc7d-9e7fc96 738->740 740->708 742 9e7fc9c-9e7fc9e 740->742 742->708 743->717 744->717 745->717 746->735 747->735 748->735 749->738 750->738 751->725 752->725 753->725 754->730 755->730 756->730
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 09E7FB2A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531770340.0000000009E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e70000_csc.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 4916cb015012add48b09b4a8590319caec2982a358e028257a9ba638fb85f0be
                                                • Instruction ID: 5edd081fd368a8ca785e0be22902af433d446b9805a1801250dc224dd8389aa3
                                                • Opcode Fuzzy Hash: 4916cb015012add48b09b4a8590319caec2982a358e028257a9ba638fb85f0be
                                                • Instruction Fuzzy Hash: 45518F317045508FC344DB38E6A4F6A37E3EB8C250B1990B9D01ACBB86CE345C09DB59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 757 9e7f188-9e7f189 758 9e7fa93-9e7fa96 757->758 759 9e7fb4e-9e7fb84 757->759 760 9e7fa9f-9e7faa5 758->760 761 9e7fa98 758->761 797 9e7fb86 call 9d1fbb1 759->797 798 9e7fb86 call 9d1fac0 759->798 799 9e7fb86 call 9d1fab0 759->799 763 9e7faa9-9e7fad6 760->763 761->760 762 9e7fca3-9e7fcaa 761->762 761->763 762->760 765 9e7fcb0-9e7fcc1 762->765 800 9e7fad8 call 9d1fbb1 763->800 801 9e7fad8 call 9d1fac0 763->801 802 9e7fad8 call 9d1fab0 763->802 765->758 768 9e7fcc7 765->768 768->758 770 9e7fb87-9e7fb8f 771 9e7fb96-9e7fbe0 770->771 811 9e7fbe2 call 9d1fbb1 771->811 812 9e7fbe2 call 9d1fac0 771->812 813 9e7fbe2 call 9d1fab0 771->813 772 9e7fade-9e7fb84 KiUserExceptionDispatcher 803 9e7fb86 call 9d1fbb1 772->803 804 9e7fb86 call 9d1fac0 772->804 805 9e7fb86 call 9d1fab0 772->805 779 9e7fbe8-9e7fc39 806 9e7fc3b call 9d1fbb1 779->806 807 9e7fc3b call 9d1fac0 779->807 808 9e7fc3b call 9d1fab0 779->808 788 9e7fb8c-9e7fb8f 788->771 789 9e7fc41-9e7fc63 809 9e7fc65 call 9e43260 789->809 810 9e7fc65 call 9e43250 789->810 792 9e7fc6b-9e7fc75 794 9e7fc7d-9e7fc96 792->794 794->758 796 9e7fc9c-9e7fc9e 794->796 796->758 797->770 798->770 799->770 800->772 801->772 802->772 803->788 804->788 805->788 806->789 807->789 808->789 809->792 810->792 811->779 812->779 813->779
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531770340.0000000009E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e70000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f17b058ff46f081b6669d63bb08e473a35dfc032d6a5884b9079b15ccdcc74cd
                                                • Instruction ID: 136d8829475b1e0fef191d36f65eb059af1dd50f46683704445e16e849bf3016
                                                • Opcode Fuzzy Hash: f17b058ff46f081b6669d63bb08e473a35dfc032d6a5884b9079b15ccdcc74cd
                                                • Instruction Fuzzy Hash: ED5191317445508FC748DB78E6A4FBA33E3EB8C244B5990B9E41ACBB46CE345C08EB59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 814 9e7fa50-9e7fa5d 815 9e7fad7 814->815 816 9e7fa5f-9e7fa73 814->816 817 9e7fade-9e7fb84 KiUserExceptionDispatcher 815->817 857 9e7fad8 call 9d1fbb1 815->857 858 9e7fad8 call 9d1fac0 815->858 859 9e7fad8 call 9d1fab0 815->859 868 9e7fb86 call 9d1fbb1 817->868 869 9e7fb86 call 9d1fac0 817->869 870 9e7fb86 call 9d1fab0 817->870 827 9e7fb8c-9e7fbe0 854 9e7fbe2 call 9d1fbb1 827->854 855 9e7fbe2 call 9d1fac0 827->855 856 9e7fbe2 call 9d1fab0 827->856 832 9e7fbe8-9e7fc39 863 9e7fc3b call 9d1fbb1 832->863 864 9e7fc3b call 9d1fac0 832->864 865 9e7fc3b call 9d1fab0 832->865 837 9e7fc41-9e7fc63 866 9e7fc65 call 9e43260 837->866 867 9e7fc65 call 9e43250 837->867 840 9e7fc6b-9e7fc96 844 9e7fa93-9e7fa96 840->844 845 9e7fc9c-9e7fc9e 840->845 846 9e7fa9f-9e7faa5 844->846 847 9e7fa98 844->847 845->844 849 9e7faa9-9e7fad6 846->849 847->846 848 9e7fca3-9e7fcaa 847->848 847->849 848->846 850 9e7fcb0-9e7fcc1 848->850 860 9e7fad8 call 9d1fbb1 849->860 861 9e7fad8 call 9d1fac0 849->861 862 9e7fad8 call 9d1fab0 849->862 850->844 852 9e7fcc7 850->852 852->844 854->832 855->832 856->832 857->817 858->817 859->817 860->817 861->817 862->817 863->837 864->837 865->837 866->840 867->840 868->827 869->827 870->827
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 09E7FB2A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531770340.0000000009E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e70000_csc.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 1dc787081739d6d1ecf788e0ee71058f4899c999e646d8de0c828f8721874646
                                                • Instruction ID: 16db2b46a109bb5a3e1962e7d2d2f897ed5a2a6a2a8fb15027b9c50074989626
                                                • Opcode Fuzzy Hash: 1dc787081739d6d1ecf788e0ee71058f4899c999e646d8de0c828f8721874646
                                                • Instruction Fuzzy Hash: 815180317445508FC344DB78E6A5F7A33E3EB8C250B5990B9D11ACBB46CE345C09EB59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 871 9e7f1d8-9e7f1d9 872 9e7fa93-9e7fa96 871->872 873 9e7fa9f-9e7faa5 872->873 874 9e7fa98 872->874 876 9e7faa9-9e7fad6 873->876 874->873 875 9e7fca3-9e7fcaa 874->875 874->876 875->873 877 9e7fcb0-9e7fcc1 875->877 910 9e7fad8 call 9d1fbb1 876->910 911 9e7fad8 call 9d1fac0 876->911 912 9e7fad8 call 9d1fab0 876->912 877->872 879 9e7fcc7 877->879 879->872 881 9e7fade-9e7fb84 KiUserExceptionDispatcher 918 9e7fb86 call 9d1fbb1 881->918 919 9e7fb86 call 9d1fac0 881->919 920 9e7fb86 call 9d1fab0 881->920 889 9e7fb8c-9e7fbe0 907 9e7fbe2 call 9d1fbb1 889->907 908 9e7fbe2 call 9d1fac0 889->908 909 9e7fbe2 call 9d1fab0 889->909 894 9e7fbe8-9e7fc39 913 9e7fc3b call 9d1fbb1 894->913 914 9e7fc3b call 9d1fac0 894->914 915 9e7fc3b call 9d1fab0 894->915 899 9e7fc41-9e7fc63 916 9e7fc65 call 9e43260 899->916 917 9e7fc65 call 9e43250 899->917 902 9e7fc6b-9e7fc75 904 9e7fc7d-9e7fc96 902->904 904->872 906 9e7fc9c-9e7fc9e 904->906 906->872 907->894 908->894 909->894 910->881 911->881 912->881 913->899 914->899 915->899 916->902 917->902 918->889 919->889 920->889
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531770340.0000000009E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e70000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8859333019c22e722edd007cd2182ac1322179efb10ae3062479e859a46eb24
                                                • Instruction ID: 22d7fb43ad90b16a23db5e909f7f8d5677627554ce10ca7bd56c87d46860bcaf
                                                • Opcode Fuzzy Hash: d8859333019c22e722edd007cd2182ac1322179efb10ae3062479e859a46eb24
                                                • Instruction Fuzzy Hash: 10518F317445508FC748DB68E6A4F7A37E3EB8C250B1A90BDE11ACBB46CE345C09EB59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 921 9e7fa88-9e7fa8e 922 9e7fa93-9e7fa96 921->922 923 9e7fa9f-9e7faa5 922->923 924 9e7fa98 922->924 926 9e7faa9-9e7fad6 923->926 924->923 925 9e7fca3-9e7fcaa 924->925 924->926 925->923 927 9e7fcb0-9e7fcc1 925->927 965 9e7fad8 call 9d1fbb1 926->965 966 9e7fad8 call 9d1fac0 926->966 967 9e7fad8 call 9d1fab0 926->967 927->922 929 9e7fcc7 927->929 929->922 931 9e7fade-9e7fb84 KiUserExceptionDispatcher 959 9e7fb86 call 9d1fbb1 931->959 960 9e7fb86 call 9d1fac0 931->960 961 9e7fb86 call 9d1fab0 931->961 939 9e7fb8c-9e7fbe0 962 9e7fbe2 call 9d1fbb1 939->962 963 9e7fbe2 call 9d1fac0 939->963 964 9e7fbe2 call 9d1fab0 939->964 944 9e7fbe8-9e7fc39 968 9e7fc3b call 9d1fbb1 944->968 969 9e7fc3b call 9d1fac0 944->969 970 9e7fc3b call 9d1fab0 944->970 949 9e7fc41-9e7fc63 957 9e7fc65 call 9e43260 949->957 958 9e7fc65 call 9e43250 949->958 952 9e7fc6b-9e7fc75 954 9e7fc7d-9e7fc96 952->954 954->922 956 9e7fc9c-9e7fc9e 954->956 956->922 957->952 958->952 959->939 960->939 961->939 962->944 963->944 964->944 965->931 966->931 967->931 968->949 969->949 970->949
                                                APIs
                                                • KiUserExceptionDispatcher.NTDLL ref: 09E7FB2A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531770340.0000000009E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e70000_csc.jbxd
                                                Similarity
                                                • API ID: DispatcherExceptionUser
                                                • String ID:
                                                • API String ID: 6842923-0
                                                • Opcode ID: 563a98b951c260a26ed3ff3cffd5e4f9e397ad29d77e3d47f33448e45c5c1e32
                                                • Instruction ID: 6c71075723ee67037405573de3a37cca831f573d024bfa34097fe2c5a867c9e6
                                                • Opcode Fuzzy Hash: 563a98b951c260a26ed3ff3cffd5e4f9e397ad29d77e3d47f33448e45c5c1e32
                                                • Instruction Fuzzy Hash: 06515C317409508FC748DB68E6A5F7A33E7EB8C240B59A079E11BCBB46CE345C09EB59
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f62297144de60f574fa82a1d1738ab3bad2762578e978ed5d0c34ef9fc48a144
                                                • Instruction ID: 32fb97fad46430eaf2e3abaeff3ff81e1b6442c0e3470dfce34228196924feae
                                                • Opcode Fuzzy Hash: f62297144de60f574fa82a1d1738ab3bad2762578e978ed5d0c34ef9fc48a144
                                                • Instruction Fuzzy Hash: 6DE11434A00504CFDB04CF18E998FA977F3FB88315F25A0A8E5069B7A5C776AC85CB95
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9ae4f83e3136d9166e8ad369952be004fdd351675c08d188a0457cd552113f5
                                                • Instruction ID: 630e1e306aae494c990ce9178d15726eafbacbc22a6197fa02bf369c0399f188
                                                • Opcode Fuzzy Hash: f9ae4f83e3136d9166e8ad369952be004fdd351675c08d188a0457cd552113f5
                                                • Instruction Fuzzy Hash: 0FD19B34B00544CFD704CF64E598BAA77F3FB89344F5490A8D1069B7A5EB34AC86DB89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d126ed173c76d5b18912f86ac622f31cf30313c1951aae7e1f822d66a3dbaa7f
                                                • Instruction ID: b82c515becd0ec63d1184d72b979d67b7fed9c533cdd7737c8f3345a9af038a1
                                                • Opcode Fuzzy Hash: d126ed173c76d5b18912f86ac622f31cf30313c1951aae7e1f822d66a3dbaa7f
                                                • Instruction Fuzzy Hash: C3E11434A00504CFDB04CF18E998FA977F3FB88315F25A0A8E5069B7A5C776AC85CB85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 23836b9e53bc60f440bfa4e2bd0278fa8dd858aa539fbcef613b7b36ab42d845
                                                • Instruction ID: d8bf645bd6c99b1309910d22ddd720a500b598b33c18dee246229b72dc42d20a
                                                • Opcode Fuzzy Hash: 23836b9e53bc60f440bfa4e2bd0278fa8dd858aa539fbcef613b7b36ab42d845
                                                • Instruction Fuzzy Hash: 57C17934B00544CFD704DF68E658BAA73F3FB89304F549068D1069B7A5EB34AC86DB99
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 579931fe165a0e7c0d9e98fb4206b9e9503ad3d63ab2dd72ca33f785b1bfbded
                                                • Instruction ID: f1089eb453cc621e20e01367bb343605f45d75d1aec193fcb9a15dd16dc04ca6
                                                • Opcode Fuzzy Hash: 579931fe165a0e7c0d9e98fb4206b9e9503ad3d63ab2dd72ca33f785b1bfbded
                                                • Instruction Fuzzy Hash: ECC1F234A00504CFD704CF18E598BA977F3FB88315F29A0A8E5069B7A5C77AAC85CF85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a35c3d0277f5988cff24f46581502c75dbcd8ccff3ec72da813a8bdd88ff9ea8
                                                • Instruction ID: dab27baecb6bfec031f4a5ee8f9ea34063408c9df4586b4b53ae60234d842c72
                                                • Opcode Fuzzy Hash: a35c3d0277f5988cff24f46581502c75dbcd8ccff3ec72da813a8bdd88ff9ea8
                                                • Instruction Fuzzy Hash: B7B14D70E00209CFDB14CFA9E9817AEBBF2BF88354F149529E415A7394EB749885CB81
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26af3a9554dd37c2cc8af5b37dbfb4d3ae6a01902e6ce0bdddb8962ba8495b0c
                                                • Instruction ID: 6a1702b2a6968610308870c0cea399e5d2203031cc7865ce85d37753e4c5b9ad
                                                • Opcode Fuzzy Hash: 26af3a9554dd37c2cc8af5b37dbfb4d3ae6a01902e6ce0bdddb8962ba8495b0c
                                                • Instruction Fuzzy Hash: 51915C70E002098FDF14CFA9E88579EBBF2BF88314F149129F925AB354DB749885CB95
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 102da83b2c3c8879721304f3fb1325a0256fbfa9b5991638d6c3aae4209340f8
                                                • Instruction ID: d65619e01a37d1a0bcadf607c1a061bf6896339834c7a8d0b67e8a743c879f1f
                                                • Opcode Fuzzy Hash: 102da83b2c3c8879721304f3fb1325a0256fbfa9b5991638d6c3aae4209340f8
                                                • Instruction Fuzzy Hash: F5914934B00644CFD704CF64E588BA9B7F3FB89344F54A068D1069B7A5EB34AC86DB59

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 594 9d1fab0-9d1fabd 595 9d1fb37-9d1fb38 594->595 596 9d1fabf-9d1fadd 594->596 598 9d1fb3e-9d1fb40 595->598 597 9d1fae2-9d1fae5 596->597 601 9d1fd44-9d1fd4d 597->601 602 9d1faeb 597->602 599 9d1fb42-9d1fb48 598->599 600 9d1fb58-9d1fb60 598->600 617 9d1fb4a 599->617 618 9d1fb4c-9d1fb4e 599->618 619 9d1fb2a-9d1fb2d 600->619 602->601 603 9d1fd70-9d1fd8a 602->603 604 9d1fbf3-9d1fc06 602->604 605 9d1faf2-9d1fb28 602->605 606 9d1fd15-9d1fd29 602->606 607 9d1fb36 602->607 608 9d1fb78-9d1fb89 LdrInitializeThunk 602->608 609 9d1fcc3 602->609 610 9d1fb62-9d1fb6f 602->610 611 9d1fbc6-9d1fbd6 602->611 612 9d1fc49 602->612 613 9d1fca9-9d1fcbd 602->613 614 9d1fc2c-9d1fc40 602->614 615 9d1fd2f-9d1fd30 602->615 616 9d1fd4e-9d1fd5c 602->616 603->597 621 9d1fd90 603->621 622 9d1fc08-9d1fc0c 604->622 605->610 605->619 628 9d1fd09-9d1fd0c 606->628 643 9d1fd2b-9d1fd2d 606->643 607->598 629 9d1fb8e-9d1fbaf 608->629 609->628 610->607 640 9d1fb71-9d1fb76 610->640 611->610 644 9d1fbd8-9d1fbe6 611->644 625 9d1fc9d-9d1fca0 612->625 613->625 639 9d1fcbf-9d1fcc1 613->639 636 9d1fc20-9d1fc23 614->636 637 9d1fc42-9d1fc47 614->637 615->601 647 9d1fd63-9d1fd6b 616->647 617->600 618->600 619->608 620 9d1fb2f 619->620 620->604 620->606 620->607 620->608 620->609 620->610 620->611 620->612 620->613 620->614 620->615 621->597 622->612 634 9d1fc0e-9d1fc1c 622->634 625->609 638 9d1fca2 625->638 628->615 641 9d1fd0e 628->641 629->622 634->636 645 9d1fc1e 634->645 636->614 648 9d1fc25 636->648 637->636 638->606 638->609 638->613 638->615 639->625 640->619 641->606 641->615 643->628 644->619 646 9d1fbec-9d1fbee 644->646 645->636 646->619 647->597 648->606 648->609 648->612 648->613 648->614 648->615
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531320779.0000000009D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d10000_csc.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 2dd8088d3b38c30e85191e06257c7dc267344292ac3334cc60ff1428271265d1
                                                • Instruction ID: 28cd67651230a073b6aaf7681f3af60123db837ed9a0c706fe95176b98148771
                                                • Opcode Fuzzy Hash: 2dd8088d3b38c30e85191e06257c7dc267344292ac3334cc60ff1428271265d1
                                                • Instruction Fuzzy Hash: 0C51B132A80644EFDB14CF6CE6947AD77F3FB89310F248469E005ABA94DB359885DF05

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 971 9d1fbb1-9d1fbc4 974 9d1fb62-9d1fb6f 971->974 976 9d1fb71-9d1fb76 974->976 977 9d1fb36 974->977 978 9d1fb2a-9d1fb2d 976->978 981 9d1fb3e-9d1fb40 977->981 979 9d1fb78-9d1fb89 LdrInitializeThunk 978->979 980 9d1fb2f 978->980 995 9d1fb8e-9d1fbaf 979->995 980->974 980->977 980->979 982 9d1fbf3-9d1fc06 980->982 983 9d1fcc3 980->983 984 9d1fd15-9d1fd29 980->984 985 9d1fbc6-9d1fbd6 980->985 986 9d1fc49 980->986 987 9d1fca9-9d1fcbd 980->987 988 9d1fc2c-9d1fc40 980->988 989 9d1fd2f-9d1fd4d 980->989 990 9d1fb42-9d1fb48 981->990 991 9d1fb58-9d1fb60 981->991 994 9d1fc08-9d1fc0c 982->994 1004 9d1fd09-9d1fd0c 983->1004 984->1004 1005 9d1fd2b-9d1fd2d 984->1005 985->974 1009 9d1fbd8-9d1fbe6 985->1009 999 9d1fc9d-9d1fca0 986->999 987->999 1010 9d1fcbf-9d1fcc1 987->1010 1006 9d1fc20-9d1fc23 988->1006 1007 9d1fc42-9d1fc47 988->1007 992 9d1fb4a 990->992 993 9d1fb4c-9d1fb4e 990->993 991->978 992->991 993->991 994->986 1003 9d1fc0e-9d1fc1c 994->1003 995->994 999->983 1008 9d1fca2 999->1008 1003->1006 1011 9d1fc1e 1003->1011 1004->989 1012 9d1fd0e 1004->1012 1005->1004 1006->988 1015 9d1fc25 1006->1015 1007->1006 1008->983 1008->984 1008->987 1008->989 1009->978 1014 9d1fbec-9d1fbee 1009->1014 1010->999 1011->1006 1012->984 1012->989 1014->978 1015->983 1015->984 1015->986 1015->987 1015->988 1015->989
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531320779.0000000009D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d10000_csc.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 2d7ef973d80774902a4fc2d80601cdfb4c2603752ae186d3680641b88616590d
                                                • Instruction ID: 7fdc9f4a649ea17927a45f7fefd7bcb44f85fded2c50b2023f92a6073cb6a173
                                                • Opcode Fuzzy Hash: 2d7ef973d80774902a4fc2d80601cdfb4c2603752ae186d3680641b88616590d
                                                • Instruction Fuzzy Hash: 2C41A332A84505EFDB14CF2CF6A9B697BB3FB84310F24D469D10297A54DB349885DF05

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1016 5a1c858-5a1c8d9 VirtualProtect 1019 5a1c8e2-5a1c907 1016->1019 1020 5a1c8db-5a1c8e1 1016->1020 1020->1019
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05A1C8CC
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2527886975.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_5a10000_csc.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 8ec60ec48660b4e776c2840ae82170bdad11be8fcd3cfe35e0ee4b90b75568d6
                                                • Instruction ID: c83499bed8cc1ad7cb109d14a926bf9a0231a6612cd26ae0ff0ce19aba6d6bf7
                                                • Opcode Fuzzy Hash: 8ec60ec48660b4e776c2840ae82170bdad11be8fcd3cfe35e0ee4b90b75568d6
                                                • Instruction Fuzzy Hash: 3A11E5B1D003099FDB20DFAAC884BDEFBF5EF48220F14842AD419A7250C7759945CFA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1024 9e452d0-9e452fd 1026 9e45303-9e45308 1024->1026 1027 9e4562b-9e4563c 1024->1027 1028 9e4530c-9e4530f 1026->1028 1040 9e45646-9e456d5 call 9e44cec 1027->1040 1041 9e4563e 1027->1041 1029 9e455e4-9e455eb 1028->1029 1030 9e45315 1028->1030 1029->1028 1030->1029 1032 9e45610-9e45626 1030->1032 1033 9e455f0-9e455f2 1030->1033 1034 9e454f3-9e45504 1030->1034 1035 9e4531c-9e45349 1030->1035 1036 9e4549f-9e454a7 1030->1036 1037 9e453e9-9e453eb 1030->1037 1038 9e454ba-9e454c1 1030->1038 1039 9e4551b-9e45523 1030->1039 1032->1028 1044 9e4540d-9e4540f 1033->1044 1045 9e455f8-9e455fd 1033->1045 1034->1039 1067 9e45350-9e4536d 1035->1067 1075 9e454aa call 9e45f60 1036->1075 1076 9e454aa call 9e45f70 1036->1076 1077 9e454aa call 9e45f40 1036->1077 1037->1035 1046 9e453f1-9e453ff 1037->1046 1042 9e454c7-9e454cc 1038->1042 1043 9e457dd-9e457e4 1038->1043 1039->1028 1071 9e456da-9e456f4 1040->1071 1041->1040 1042->1028 1047 9e45415-9e45426 1044->1047 1048 9e45701-9e4570f 1044->1048 1045->1028 1046->1028 1051 9e45405-9e45408 1046->1051 1047->1028 1055 9e4542c-9e4542f 1047->1055 1058 9e45717-9e45725 1048->1058 1051->1028 1055->1028 1055->1036 1056 9e454b0-9e454b5 1056->1028 1058->1028 1060 9e4572b-9e4572e 1058->1060 1060->1028 1067->1028 1072 9e4536f-9e45372 1067->1072 1071->1028 1074 9e456fa-9e456fc 1071->1074 1072->1028 1074->1028 1075->1056 1076->1056 1077->1056
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: K^
                                                • API String ID: 0-2070904481
                                                • Opcode ID: a12340d48ab5b5be8657dd2854410f75f6a8f9c4d84d432c10adb38d628d66e3
                                                • Instruction ID: 3ae3c38fa25a6d4a8f2b7139c639cf8eb89898f097fdcfda4a1138c92967add9
                                                • Opcode Fuzzy Hash: a12340d48ab5b5be8657dd2854410f75f6a8f9c4d84d432c10adb38d628d66e3
                                                • Instruction Fuzzy Hash: 0F615B34A01208DFDB14DBA4E558BADBBB3EB84700F209528F8066B799DF749D45CF85

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1153 5a1ca08-5a1ca77 CloseHandle 1156 5a1ca80-5a1caa5 1153->1156 1157 5a1ca79-5a1ca7f 1153->1157 1157->1156
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2527886975.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_5a10000_csc.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: d978afc8e5ae0de98b1a15c9e65d8d9c51a28671a4fd3e16905edc52854f71f4
                                                • Instruction ID: 24f871bdafb9ebcb27e4e56646109de94c8184e33f540a54699e3c119d4fdcf1
                                                • Opcode Fuzzy Hash: d978afc8e5ae0de98b1a15c9e65d8d9c51a28671a4fd3e16905edc52854f71f4
                                                • Instruction Fuzzy Hash: 50113AB1D003488FDB24DFAAD4457DEFBF5EF88224F24841AD419A7240C7756944CBA4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531285013.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d00000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8f8bcaea52f5ce0841f08d5bf1ed2a7386fddbcec2af993c9cf111a403ab9df
                                                • Instruction ID: 242f517fb8d94c65d13c19065a4ec7137f81cc99f0bc23ec7597d289c2c8ceac
                                                • Opcode Fuzzy Hash: a8f8bcaea52f5ce0841f08d5bf1ed2a7386fddbcec2af993c9cf111a403ab9df
                                                • Instruction Fuzzy Hash: 15022620FC0310ABCA352A75947D73E25A79BD5BA0B85403AE547D7BC4EE68CC42E792
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531285013.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d00000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a5e2dd45ca284caa69405a7536ab98fcf346f46d2b68d4f49c798fa4b7d0445e
                                                • Instruction ID: 2c72df3454ed55a5b3a4dd7e698a106a6231417f754a5645a611d476e5a5556d
                                                • Opcode Fuzzy Hash: a5e2dd45ca284caa69405a7536ab98fcf346f46d2b68d4f49c798fa4b7d0445e
                                                • Instruction Fuzzy Hash: 23C13E34B81204AB8F296B64E06E77D7AB3FBD5761729842AE807D3780DF398C42D745
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a0e2dd0c3bd3bfd1b2bc52d9dcf6bcbc12327a841f0d0bbc200ae8fcb204d30b
                                                • Instruction ID: 4982d74b8d9b593338cd6920a3da518b492167e17f559209634e4782eb443f7a
                                                • Opcode Fuzzy Hash: a0e2dd0c3bd3bfd1b2bc52d9dcf6bcbc12327a841f0d0bbc200ae8fcb204d30b
                                                • Instruction Fuzzy Hash: 46A188713043506FDB269B78E85066E7BA2EFC6710B1484AAD545CF392DE38DC06C7A1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3456566962c9148cdd101c1f4a7eb682b6c8e48fa78957ba3dd87fde7a79f8ea
                                                • Instruction ID: a47b925ed30eea2703366f5d1ae5173bd11fe55fb0101ae5efbdbd5edb27ce1d
                                                • Opcode Fuzzy Hash: 3456566962c9148cdd101c1f4a7eb682b6c8e48fa78957ba3dd87fde7a79f8ea
                                                • Instruction Fuzzy Hash: 2BA16D70E00209CFDB10CFA9E98579DBBF2BF48354F14A629E425E7394EB749885CB91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f890d0fa5381fa17bedef0a545a8768925b4c81e032c4b3c128eade237d06517
                                                • Instruction ID: 452072a66a60da00761b72ffc01a88493bfdf2dbfe1d05a89c53d24701b1e467
                                                • Opcode Fuzzy Hash: f890d0fa5381fa17bedef0a545a8768925b4c81e032c4b3c128eade237d06517
                                                • Instruction Fuzzy Hash: 01914A70E002098FDF10CFA9E88579DBBF2BF88314F149129F925AB354DB749886CB95
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ac619331794634ef2282654408c3ab03472eaaa0586f5436fa4d67160fdd237d
                                                • Instruction ID: b703721d0a1b5d7c75870bb6f807ce3b06cc202ecba97770653fb2a14054bd28
                                                • Opcode Fuzzy Hash: ac619331794634ef2282654408c3ab03472eaaa0586f5436fa4d67160fdd237d
                                                • Instruction Fuzzy Hash: 7C61E030B00B549FDB24DF28D558A6ABBF6FF89710B148969D48ACB741DB34EC02CB85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531285013.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d00000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d486d2bd1c58e8c1f567819da59248fa7871bd7537ac26a840133a1fee6cc77
                                                • Instruction ID: 47748f2725446f787a661a3e598f612ef05ebc1b6f34a46ac08ee892cbc963b7
                                                • Opcode Fuzzy Hash: 0d486d2bd1c58e8c1f567819da59248fa7871bd7537ac26a840133a1fee6cc77
                                                • Instruction Fuzzy Hash: A25183203802415BE3081AD9D4B876BBAFF9BD5701F94803DA246CB6D5DFE5CC4697A1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ec89b7214c3740cfab3aa423856078761ed5703fc69e8de1b10aa58d650ce41
                                                • Instruction ID: 896e034e56412e9af3bb41ba342c047e01219d80b27934c207e832ccbd483c41
                                                • Opcode Fuzzy Hash: 6ec89b7214c3740cfab3aa423856078761ed5703fc69e8de1b10aa58d650ce41
                                                • Instruction Fuzzy Hash: E5418D70B00502CFD714CF15E548BAAB3E3EB84344F18E8A9E41A8B695D73ADE45EBC4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd00224c2e0509616c4fc489dd969738e58ecfcfda9c4788969e28ad39687989
                                                • Instruction ID: 66f7411a4c31fe3f1bd571d938f5519732db03d6b6db0de3c7d28c9f49df9e7a
                                                • Opcode Fuzzy Hash: fd00224c2e0509616c4fc489dd969738e58ecfcfda9c4788969e28ad39687989
                                                • Instruction Fuzzy Hash: F5419E31A01600CFD714CF65E988BAAB7B3FB88310FA4D168E11A5B795CB75AC46CB45
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6bebcbfc958d4951d9f36b5bf92bcab62da152e65b43e6463801190eff5d2ef2
                                                • Instruction ID: 69ee8c37722b42364972e3b5a8c49e191052380d62009452b2b888d304b5be26
                                                • Opcode Fuzzy Hash: 6bebcbfc958d4951d9f36b5bf92bcab62da152e65b43e6463801190eff5d2ef2
                                                • Instruction Fuzzy Hash: FA419D30A00600CFDB14CF65E988BAAB7B3FB89310FA4D178E11A5B795CB75AC45CB45
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7cf829f4d22f0049e940f3a02f8b072adc1193cb246f37135be5f9c1c23e2288
                                                • Instruction ID: 1bed04b977da02aaf86da4ccce6dd37b2f3eaa26f4b5a566d8bf07438b81aac9
                                                • Opcode Fuzzy Hash: 7cf829f4d22f0049e940f3a02f8b072adc1193cb246f37135be5f9c1c23e2288
                                                • Instruction Fuzzy Hash: 5841B670A00142CFD714CF15E548BAAB7E3EB84304F08E5A9E416CB695E3369E46DFC4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06a62c1aff1f056bb50be957506d0101da58049da7b21d8d29a96b28d30c7ba7
                                                • Instruction ID: 39bc475e897724e1f974fe20d37c7575d205a8ce740a52b4118604141fca473d
                                                • Opcode Fuzzy Hash: 06a62c1aff1f056bb50be957506d0101da58049da7b21d8d29a96b28d30c7ba7
                                                • Instruction Fuzzy Hash: D831C230B01308DBDB149A64F1587BEBBA3EB80B00F209129F5079B78DDEB49D469F85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8347e6a1e896d06c28474ca4db153bcdffed7ff624cac849ff2279cb33940756
                                                • Instruction ID: 71576ecedd8d8540f002584da097549a68fc60bbace7a2804a8b83916456936e
                                                • Opcode Fuzzy Hash: 8347e6a1e896d06c28474ca4db153bcdffed7ff624cac849ff2279cb33940756
                                                • Instruction Fuzzy Hash: D541F2B1D00348DFDB20CFA9D884ADEBBF5EF48314F148029E41AAB254DB75A985CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 69deceb4150ff64aa8fdf8812a9e7b02d81f83cc2126818e2eb11eb3534fcd3f
                                                • Instruction ID: 3caae9f370c9d2a52277fdac2f8560675c77d8d32fec9819886721096be1128e
                                                • Opcode Fuzzy Hash: 69deceb4150ff64aa8fdf8812a9e7b02d81f83cc2126818e2eb11eb3534fcd3f
                                                • Instruction Fuzzy Hash: 4431EE31604600CFD720CB60E958B69B7A3FB89315FA4D1A9F11A8B6D5CB75EC85CB06
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1e61de4098c1b77a14570f6dd2a5d52253bc3395f700f577eacb34e85759ea9f
                                                • Instruction ID: 930a82a85f1c6ea3862f5818cb33dc0ffabae03bf329cb471ebc10858388f5ff
                                                • Opcode Fuzzy Hash: 1e61de4098c1b77a14570f6dd2a5d52253bc3395f700f577eacb34e85759ea9f
                                                • Instruction Fuzzy Hash: FC41E1B1D00349DFDB10DFA9D484ADEBBF5FF48314F148029E81AAB254DB75A985CB90
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ebd576d18abb5073d2eea5286244b6e6ccb51ea794d4034735dc850a52bb2399
                                                • Instruction ID: 9a43b7a87a8559f5a3454e11790de14cd0269cd50979e076c6b8297b5f9cbdc6
                                                • Opcode Fuzzy Hash: ebd576d18abb5073d2eea5286244b6e6ccb51ea794d4034735dc850a52bb2399
                                                • Instruction Fuzzy Hash: E331A130B04542CFD724CF16E548BB6B3A3EB80344F19E4A9E41A8B696D7369E45EFC4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 42319966580fb2d1734305c5e5f3a52096c487fe050794444d37d04cd7ecba50
                                                • Instruction ID: e0e656badddea491fac3bb76ef743637ef83afe74c18dbcedab002a0c3a263ea
                                                • Opcode Fuzzy Hash: 42319966580fb2d1734305c5e5f3a52096c487fe050794444d37d04cd7ecba50
                                                • Instruction Fuzzy Hash: A4313C34701308CFDB149A64F1587ADB7A3AB84B00F249525E8079B78EDFB89D46DF85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99283845cfdf5b5f3efe7027c6bbd3d99cd38d00e6744b70c0100cdb5e0e6582
                                                • Instruction ID: 7bbd0d560242f0d22a9390175c11337602d313eb5b19072cc7df88ed7c4a1223
                                                • Opcode Fuzzy Hash: 99283845cfdf5b5f3efe7027c6bbd3d99cd38d00e6744b70c0100cdb5e0e6582
                                                • Instruction Fuzzy Hash: 6F316B34701308CFDB14DA14E2587ADB7A3AB80B00F219524E9069B78EDFB8AD45DF89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 903adef8d178ee48418076cb410e216fa4ab27932592291c8aa7fda460bfebf1
                                                • Instruction ID: 4ccfc3e151b9fc9162c3c3d6e8de0cd309eefe5e17099fd70798a9ee7da5ee1a
                                                • Opcode Fuzzy Hash: 903adef8d178ee48418076cb410e216fa4ab27932592291c8aa7fda460bfebf1
                                                • Instruction Fuzzy Hash: 1A317C34701308CFDB14DA54E158BAEB7A3AB84B00F209124F4069B78EDEB99D46DF85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ef46998bc080080d48ab95f159f38ea7becb84fe92753205ed84fe47bdb4cb07
                                                • Instruction ID: 71127af3a2ace9e666831d1a131574e1613f75f53e39b8b3db58474c5fc4fad7
                                                • Opcode Fuzzy Hash: ef46998bc080080d48ab95f159f38ea7becb84fe92753205ed84fe47bdb4cb07
                                                • Instruction Fuzzy Hash: 41314934701308CFDB149A64F1587ADBBA3AB84B00F249528E4079B78EDFB89D46DF85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 65aa4f36296fb3c79299b23933cb2eebd46ecb9a9f2d0d66642892a19b6ac509
                                                • Instruction ID: 988a84fd30f04c3f99c59acee7ca3b1c2cef7936c58f7ac776cac42cc3d4f0b8
                                                • Opcode Fuzzy Hash: 65aa4f36296fb3c79299b23933cb2eebd46ecb9a9f2d0d66642892a19b6ac509
                                                • Instruction Fuzzy Hash: 60318C34701308CFD714DA64E1587ADB7A3AB84B00F209124F4069B78EDFB89C46DF49
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 921f4795cf3323cc4bdc2b547b09033f82af85539849004d54bcb1586f6dd1d5
                                                • Instruction ID: 8eecc3d029195a751c70ea79d6901041b57410c2eec024bb983de41be9833a8d
                                                • Opcode Fuzzy Hash: 921f4795cf3323cc4bdc2b547b09033f82af85539849004d54bcb1586f6dd1d5
                                                • Instruction Fuzzy Hash: A6212E34701308CFDB149A54F1587AEB7A3AB80B00F21A524E5079B78EDFB99D45DF85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1410021bf2ad0dbd139163a181ee9abc968e2fcb5c4257d564a6311a64f9e59
                                                • Instruction ID: a34d90e4fb2add9d02fafeef822add68168cc3b711db97d5501145f138a03695
                                                • Opcode Fuzzy Hash: e1410021bf2ad0dbd139163a181ee9abc968e2fcb5c4257d564a6311a64f9e59
                                                • Instruction Fuzzy Hash: B5213D34701308CFD7149A54F1587AEB7A3AB84B00F249524E5079B78EDFB8AD46DF89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 427a27e3f9af70ee05c4fb8de1d399257ecefbb9242438b94d014246bb062860
                                                • Instruction ID: 9dd3d07aee7f1da387bf3ed2a0111d3038cc159a645e6069aaa907b28da34976
                                                • Opcode Fuzzy Hash: 427a27e3f9af70ee05c4fb8de1d399257ecefbb9242438b94d014246bb062860
                                                • Instruction Fuzzy Hash: 0F214B34701308CBD714DA54E1587ADB7A3AB84B00F259524E4069B78EDFB89D45DF89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: caade73bfd116847af58443175de43879acdaa632768604ac0d6e8d3810cb886
                                                • Instruction ID: a93208ae332859961d8c8eb4e30e0268327ac2d5ca8eca639b8fb9954f8d0ca3
                                                • Opcode Fuzzy Hash: caade73bfd116847af58443175de43879acdaa632768604ac0d6e8d3810cb886
                                                • Instruction Fuzzy Hash: AE216030702308CBDB149654F1187BEA7A3AB84B00F25A525F8075B78EDEB89D469F89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c0a49f50d7d85879646c13caedbe653e68ad758222baca0190042fd8b059353
                                                • Instruction ID: 07436c3fc347d922625ca6220817d3550d713ebf1d3d7d56cc8b22b897b008ba
                                                • Opcode Fuzzy Hash: 5c0a49f50d7d85879646c13caedbe653e68ad758222baca0190042fd8b059353
                                                • Instruction Fuzzy Hash: 05212834701308CBD7149A54F1587AEB7A3AB84B00F219524E4079B78EDFB8AD4ADF89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 059491cab9dc1726937a7ff02f26e0a164511e8f9664035e8059d60cdce2f58f
                                                • Instruction ID: b9de053876cf2072085e56c9f0f906bf85aeb1398fabb04087eed1ea1c4a832c
                                                • Opcode Fuzzy Hash: 059491cab9dc1726937a7ff02f26e0a164511e8f9664035e8059d60cdce2f58f
                                                • Instruction Fuzzy Hash: A5212834701308CBDB149A54F1587AEB7A3AB84B00F219524E4079B78EDFB8AD469F89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54ae14c8390b41f81903bb4b470ef54b3faa55996b2870c272005c32d8c1627d
                                                • Instruction ID: f89dc735d71ece975dc7d4eaf1444f07b8d4ea542a2482998a9e977b20339ad2
                                                • Opcode Fuzzy Hash: 54ae14c8390b41f81903bb4b470ef54b3faa55996b2870c272005c32d8c1627d
                                                • Instruction Fuzzy Hash: BC213B30B01308CFDB14DA54F1587AEB7A3AB84B00F259524E4079B78EDEB89D469F49
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e371ec52490239e3e09a5a822a3bfde2c0fb5826465a6383a04df37e0b32f81e
                                                • Instruction ID: 818fb18d6e5f2fd90aa08fe4d00a92757718650baf951367491c6965a80277c5
                                                • Opcode Fuzzy Hash: e371ec52490239e3e09a5a822a3bfde2c0fb5826465a6383a04df37e0b32f81e
                                                • Instruction Fuzzy Hash: A9218030701308CBDB149654F1187AEA7A3AB80B00F209524F8079B78EDFB89D469F85
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0ffd33a26fdcb170ee42c8878bd02ed0747580c88ac13040abc4fa64536ce00
                                                • Instruction ID: bfe7c909e394a3ffda639563427b7ecb7bce2085a61aeb605219857fae30acfe
                                                • Opcode Fuzzy Hash: d0ffd33a26fdcb170ee42c8878bd02ed0747580c88ac13040abc4fa64536ce00
                                                • Instruction Fuzzy Hash: AC215E34701308CBDB149A54F1587AEB7A3ABC4B00F219524E5079B78EDFB8AD46DF89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cdd8b56a82f161142d982e0ca5cee739030275fb13e6f34bc203d352f9a8dc0b
                                                • Instruction ID: fe77132a0c39223d06cc64da491fff4d3b96d1f0e0c728aedf82b7a2c9f1cd43
                                                • Opcode Fuzzy Hash: cdd8b56a82f161142d982e0ca5cee739030275fb13e6f34bc203d352f9a8dc0b
                                                • Instruction Fuzzy Hash: 44218B34701308CBDB149A50F1187AEB7A3AB84B00F209524E5079B78EDFB8AD469F89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9180888dcdf89d2ebd7133b7ad52e8a3f410107f3d33a639ef5b8c58e7e49060
                                                • Instruction ID: 6ad8e552456b3823f2a1a05b6ba36de772d31873f650d6247a0e04f78a21f8cf
                                                • Opcode Fuzzy Hash: 9180888dcdf89d2ebd7133b7ad52e8a3f410107f3d33a639ef5b8c58e7e49060
                                                • Instruction Fuzzy Hash: 71216D34701308CFDB149A64F1587AEB7A3AB84B00F209524E5079B78EDFB89D469F89
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb594aef208b413d18f3bc145c4f5609e863a77f12561b9cc02b817d2638b598
                                                • Instruction ID: 0735ec013c9dc8f8fd8d425e0cf88fa2e34c4994f9f4b7d9c601d3e6792e4649
                                                • Opcode Fuzzy Hash: fb594aef208b413d18f3bc145c4f5609e863a77f12561b9cc02b817d2638b598
                                                • Instruction Fuzzy Hash: 3E11E1B1B4A3906FCB163774542136D3FA26F86201B1608AFD18ACF282ED3988878385
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12bc60ce8766aa8225c2c3e1bc10c30eac6204485ab72119d719634136ec3482
                                                • Instruction ID: 456225d7068c7684a3028645289c0f9b7349f77252b9c04dbad6373cfbc82e69
                                                • Opcode Fuzzy Hash: 12bc60ce8766aa8225c2c3e1bc10c30eac6204485ab72119d719634136ec3482
                                                • Instruction Fuzzy Hash: 6311C170A40105CFCB20DB25E558BAE77F7FB88314F54A479D00A97200E77A9D86DBC4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d1b22c2b588cfbe60c3727c3e8a3cfb58bd70132f4a6e20986d0fdea0d474c36
                                                • Instruction ID: e01e8c45752b5740ea7c71466ba39f85f9dc1fe0cdb46adc0b4e0a111fdb250e
                                                • Opcode Fuzzy Hash: d1b22c2b588cfbe60c3727c3e8a3cfb58bd70132f4a6e20986d0fdea0d474c36
                                                • Instruction Fuzzy Hash: 4A11E170A00105CFCB20DB25E558BAE77F3FB88314F54A079D0099B240EB769D45DBC4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3533c74abb080c6a8984da37faef12b14f645680fa9c4aca4710c0e596aa517
                                                • Instruction ID: 1d0675a4a164d10062f453560b570793bd9c44dd477e3d564530d78fab82943f
                                                • Opcode Fuzzy Hash: b3533c74abb080c6a8984da37faef12b14f645680fa9c4aca4710c0e596aa517
                                                • Instruction Fuzzy Hash: 2901AD31A00248ABDB149B64E4599DEBBB6EB89B10F104029E402A7381CF7A4E02CF94
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531285013.0000000009D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09D00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9d00000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a1b2da4ad29a89b68674ff9c399c9717de0141ed50201e0b7fb2d397d27c76d
                                                • Instruction ID: 09234e40ccb9119ce5c155f6601bf3a4d04505e6d9fabd23347b1efdf2794875
                                                • Opcode Fuzzy Hash: 9a1b2da4ad29a89b68674ff9c399c9717de0141ed50201e0b7fb2d397d27c76d
                                                • Instruction Fuzzy Hash: DE014E34B89350AFCB170624E8367753F76AFC627031500A7D445C7A81E6284C4AD7A1
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75bd86cdb5d15e570045d5d65ba480776e155a0cde64af1a602620b0a0d0ce4e
                                                • Instruction ID: aceed7f1e2cb88ea9900bbccb694ba05fbeb716c772f17e595bc62c5a624fe70
                                                • Opcode Fuzzy Hash: 75bd86cdb5d15e570045d5d65ba480776e155a0cde64af1a602620b0a0d0ce4e
                                                • Instruction Fuzzy Hash: D501D232A093858FEB429B28DB4676A7FF49F06324F0914DAD8458B153C7391505CB4A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e1c78cad0904246583aea364e28a8f145f13362c28de31e6737ef84cb5b5a40
                                                • Instruction ID: 578be710e73a45890e59b8e9a1cd177674b4c4b120d6a27f4687b7f9d5c444fb
                                                • Opcode Fuzzy Hash: 4e1c78cad0904246583aea364e28a8f145f13362c28de31e6737ef84cb5b5a40
                                                • Instruction Fuzzy Hash: 84F0F6707463606FDB263B38841472E3AD26FC9212B24487DD687CB381EE3ACC8683C4
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e17fb1c1950a7f576065a610feab9749d90ed06fc969ac8d56633009b82fe04
                                                • Instruction ID: 81eac94204dfb6a5f7760a493912c7dbbb0dfe291b807f29cc60d221b8524fd7
                                                • Opcode Fuzzy Hash: 8e17fb1c1950a7f576065a610feab9749d90ed06fc969ac8d56633009b82fe04
                                                • Instruction Fuzzy Hash: 57017131A00208EBDF149F64E91DAAEBFB6EB8D711F104429E402A7351CF765D05DF91
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cd92fdda1228c2fdf388fe4189700a4c6660c78df7f146cfbb508d4e6c0e98b7
                                                • Instruction ID: 45b0e3ef7e16c7813f525cfa32edfb667592745c915cf4ed1fca096dde0a31ab
                                                • Opcode Fuzzy Hash: cd92fdda1228c2fdf388fe4189700a4c6660c78df7f146cfbb508d4e6c0e98b7
                                                • Instruction Fuzzy Hash: 28F02172E093106BEB55EFB6A40975EBBA9EB4D314F05C077D44DD7202D638C8458B86
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9cf2ebe333fb28889c644c08004e3fb0d0d10765dd00e97d48775590f8ab4a50
                                                • Instruction ID: 82c83cce87272d395c372af7ab28286adea2bd1a06f4b8ba9ddee5b1e8ac30a0
                                                • Opcode Fuzzy Hash: 9cf2ebe333fb28889c644c08004e3fb0d0d10765dd00e97d48775590f8ab4a50
                                                • Instruction Fuzzy Hash: 7CF027313043515FD7169F6DF514F9A7BAAAB86624F0000ABF204CB192CF69EC4AC7E9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2f787fde19366acf2d9ce6df7bb8bc606bd293223efc8d05d4829c655b856360
                                                • Instruction ID: 48978f8598e872c8db2df7d0b90756763a0b7138eee860e54451ae05da6e9a45
                                                • Opcode Fuzzy Hash: 2f787fde19366acf2d9ce6df7bb8bc606bd293223efc8d05d4829c655b856360
                                                • Instruction Fuzzy Hash: 62F06271B405189FCB04EAACE848ADD77E2FF89714F110464D105AB361DB35AD168B95
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b951f61c0cee9462eca5b9c569d9c82bc67a741d7557aaa1d64fe1456c3e71a0
                                                • Instruction ID: 5c80d775d8d45fdfa848b9012f4e378cf3930fdbe8c767fc6fc8288c3e8b8a51
                                                • Opcode Fuzzy Hash: b951f61c0cee9462eca5b9c569d9c82bc67a741d7557aaa1d64fe1456c3e71a0
                                                • Instruction Fuzzy Hash: 6FF0E972E0522067EB59DFAAA40975EB7A9EB89710F01C076D80DD3202D634C8058A81
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 92d2874522d299b28dd18bbaa0024605129cd033b7ef18846476dca7afb97f59
                                                • Instruction ID: 54cc497435136aa0ed746553af7b2d684e4de1bdf827ee2bf9eefaae50a1edd8
                                                • Opcode Fuzzy Hash: 92d2874522d299b28dd18bbaa0024605129cd033b7ef18846476dca7afb97f59
                                                • Instruction Fuzzy Hash: FFF05E317005189FCF00EAACE918ADE7BE6EF89701F500464D105AB3A1DB75AD158B95
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11de9ff65c003a30851c927de98256e3428390591eafe5fa83b65ec4e8904cdd
                                                • Instruction ID: 14d7972436aaaaf89a8bf3f095fe17d648af3c1ce665a10f0abef34ba1157b61
                                                • Opcode Fuzzy Hash: 11de9ff65c003a30851c927de98256e3428390591eafe5fa83b65ec4e8904cdd
                                                • Instruction Fuzzy Hash: 07E09A38A01004CFEB44CA16FE48BA8B363FBC4319F14E071F50682945CF345E6ADE09
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ffda3afa39f2ad530097257fe4057e440db834132640c349f9f2e40225446f4
                                                • Instruction ID: f1c166e3ebf5f2dec09a6388a2e87ff36e54e40dec44f0dee3607665818de465
                                                • Opcode Fuzzy Hash: 8ffda3afa39f2ad530097257fe4057e440db834132640c349f9f2e40225446f4
                                                • Instruction Fuzzy Hash: CBF0F8B4A45658CFC760CF28C948A88BBF1BF4A314F1981D9D54E9B761D730AD41CF40
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7a932875aabba0c9f11d90c4528567d2ef940e1f7f1e19674448520ee591f889
                                                • Instruction ID: d8fb9f6f96de79e05a4ceb3d8ca6d1a40279b77a34da15b27929c164d0f99d73
                                                • Opcode Fuzzy Hash: 7a932875aabba0c9f11d90c4528567d2ef940e1f7f1e19674448520ee591f889
                                                • Instruction Fuzzy Hash: AFF0F2B4A04258CFC750CF28CA54A88BBB1FF4A309F1505D8E54EAB721C770AE80CF40
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bd9df815de608327934913544bc0b75755c683bc6b547d7a1e18a91c5ab96330
                                                • Instruction ID: 62f0ee309f170fe0872d526c9a0b3b186e194a71eba63547b7bdace3c4fc06d7
                                                • Opcode Fuzzy Hash: bd9df815de608327934913544bc0b75755c683bc6b547d7a1e18a91c5ab96330
                                                • Instruction Fuzzy Hash: ADD02B313003044BC715AE2EE608F4A739FEBC5610F400036E1188B200CFB4DC49CBE9
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 779d8ed24f537032915aa05466b254ed82dc1323ff91030a5dd722932720ba6d
                                                • Instruction ID: 9cf2f97010b9146fa6f94c1b21b62fde914950ff3ca458454b9065eb8f55841b
                                                • Opcode Fuzzy Hash: 779d8ed24f537032915aa05466b254ed82dc1323ff91030a5dd722932720ba6d
                                                • Instruction Fuzzy Hash: EFE08C31A00149DFCB00DE99DA08BEBB3F5EB88312F005075E91597240D778691ADF8A
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1c9f9f7245a34e44c1bae6928c22fe8253acb01bac633818c9dd67563abeef48
                                                • Instruction ID: 25ee086a5d776dc0e3c21cdb7e7a0d2169ae22bfa06d325259b12a98315ab1f0
                                                • Opcode Fuzzy Hash: 1c9f9f7245a34e44c1bae6928c22fe8253acb01bac633818c9dd67563abeef48
                                                • Instruction Fuzzy Hash: 80E086F1E01315EFFB58AF98D88C6583B74BB45701F41046CD94B9B602C734D80A9E45
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 545631547af74ea9cbd7e6d46873d89d6a18d81f2f00025ebdb191c20635ae31
                                                • Instruction ID: 84a05ae59e7177d9f9772af9a0b028e71eed16342659ab6c13342bf77ad23428
                                                • Opcode Fuzzy Hash: 545631547af74ea9cbd7e6d46873d89d6a18d81f2f00025ebdb191c20635ae31
                                                • Instruction Fuzzy Hash: 73E01A306004109FC708DF28E6A4BA533E2EB48344F1961A990069BA92CB245C08DB99
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 476a82636d258b30f0cad7aeef824dd563c08ff085e7a77364ca91fd3a1ea963
                                                • Instruction ID: a21a7460a95556e31e45881382a43dd09a179209ebc526839d98146923dba5ed
                                                • Opcode Fuzzy Hash: 476a82636d258b30f0cad7aeef824dd563c08ff085e7a77364ca91fd3a1ea963
                                                • Instruction Fuzzy Hash: 61D017A560A3C26FD30786347420A923F32ABA7514F6A819AE0504E193DA190E97C319
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 92208858757be20df1ec6d87c876dff2b3a19a31c81f845cadedcc1a02f54d40
                                                • Instruction ID: f7b6d9f51c6553f53fdaeb580b920b5c6b1019d03eb7689b144eff6099811221
                                                • Opcode Fuzzy Hash: 92208858757be20df1ec6d87c876dff2b3a19a31c81f845cadedcc1a02f54d40
                                                • Instruction Fuzzy Hash: 47D01235E0410D97CF00D599D9056EFB3B8D784311F404471DA1567280FB39AA264A92
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2531602059.0000000009E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 09E40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_9e40000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f0b10124155699d4aa1f84f3b1a074058c4bf78fefe7466e4f7e1f53ceda60ca
                                                • Instruction ID: 5d3d95b76b6935538dd41a7879d897c901ce76e1a95b47f5a7b582e144fa0a97
                                                • Opcode Fuzzy Hash: f0b10124155699d4aa1f84f3b1a074058c4bf78fefe7466e4f7e1f53ceda60ca
                                                • Instruction Fuzzy Hash: 32D09EB6519380AFC7169B20D4A0850BB71EF7A204B19C4DAD4488A152D6369E57D716
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2528524176.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_7380000_csc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8082ecb012b451d4aec9c5f106f7eaff6c7d7b39fe5167478fb8168520ce2ad
                                                • Instruction ID: cd7a00f1ad93b42953bc0d6bd893ed9b8a250ffa921037f8704aae1d2552134a
                                                • Opcode Fuzzy Hash: d8082ecb012b451d4aec9c5f106f7eaff6c7d7b39fe5167478fb8168520ce2ad
                                                • Instruction Fuzzy Hash: 41B012B146C10EC7F2485B25D80E3C1FE26BB00301F0D43B28C0FC5922C735CC868640