Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MicrosoftOfficeWord.exe

Overview

General Information

Sample name:MicrosoftOfficeWord.exe
Analysis ID:1587447
MD5:2db79d70849a29f5c04cdc4ef1e40674
SHA1:69104324e2f4c6516ccfaf1ac86012a1376bd2f7
SHA256:92e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0
Tags:exeuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
IP address seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MicrosoftOfficeWord.exe (PID: 5348 cmdline: "C:\Users\user\Desktop\MicrosoftOfficeWord.exe" MD5: 2DB79D70849A29F5C04CDC4EF1E40674)
    • csc.exe (PID: 6224 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3899017253.0000000008252000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000003.00000002.3899396330.00000000099F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: csc.exe PID: 6224JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          3.2.csc.exe.99f0000.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            3.2.csc.exe.82d6a48.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MicrosoftOfficeWord.exeAvira: detected
              Source: MicrosoftOfficeWord.exeReversingLabs: Detection: 65%
              Source: MicrosoftOfficeWord.exeVirustotal: Detection: 69%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
              Source: MicrosoftOfficeWord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: MicrosoftOfficeWord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: MicrosoftOfficeWord.exe
              Source: Binary string: Fxjvdwlxzkd.pdb source: csc.exe, 00000003.00000003.2430616893.000000000834C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899256489.0000000009830000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: MicrosoftOfficeWord.exe
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_0040F130 GetCurrentProcess,GetMappedFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,0_2_0040F130
              Source: global trafficTCP traffic: 192.168.2.5:49710 -> 181.71.216.203:30203
              Source: Joe Sandbox ViewIP Address: 181.71.216.203 181.71.216.203
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: newstaticfreepoint24.ddns-ip.net
              Source: csc.exe, 00000003.00000002.3898686850.000000000730D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3898686850.0000000007147000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: csc.exe, 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: MicrosoftOfficeWord.exeString found in binary or memory: https://zoom.us/privacy/Zoom
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_004300A00_2_004300A0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00430BEA0_2_00430BEA
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_0040DC500_2_0040DC50
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_004304AC0_2_004304AC
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00403F130_2_00403F13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_055A42C83_2_055A42C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_055A42BE3_2_055A42BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_055A1B2D3_2_055A1B2D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E957583_2_06E95758
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9D5E03_2_06E9D5E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9E6883_2_06E9E688
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E957493_2_06E95749
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E94DC03_2_06E94DC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E94DB13_2_06E94DB1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9D9173_2_06E9D917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098021483_2_09802148
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09802D603_2_09802D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098074B03_2_098074B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09803E083_2_09803E08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098046403_2_09804640
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098049E13_2_098049E1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09803DF93_2_09803DF9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098024903_2_09802490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098074A13_2_098074A1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098078B93_2_098078B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_098046313_2_09804631
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABFA883_2_09ABFA88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABFA783_2_09ABFA78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABFA503_2_09ABFA50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABE4D03_2_09ABE4D0
              Source: MicrosoftOfficeWord.exeBinary or memory string: OriginalFilename vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exe, 00000000.00000002.2194040145.000000000455C000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYxttxbmsat.exe" vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exeBinary or memory string: OriginalFilenameZoom* vs MicrosoftOfficeWord.exe
              Source: MicrosoftOfficeWord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal80.evad.winEXE@3/0@1/1
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_004113D0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_004113D0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00411A50 CoInitializeEx,CoUninitialize,CoCreateInstance,SysAllocString,SysFreeString,CoSetProxyBlanket,_com_issue_error,0_2_00411A50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\mono1234
              Source: MicrosoftOfficeWord.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: MicrosoftOfficeWord.exeReversingLabs: Detection: 65%
              Source: MicrosoftOfficeWord.exeVirustotal: Detection: 69%
              Source: unknownProcess created: C:\Users\user\Desktop\MicrosoftOfficeWord.exe "C:\Users\user\Desktop\MicrosoftOfficeWord.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: crowdstrikeceoisextragay.dllJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeSection loaded: sentinelisabadedrtrynexttimemaybe.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: MicrosoftOfficeWord.exeStatic file information: File size 3567616 > 1048576
              Source: MicrosoftOfficeWord.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x33c000
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: MicrosoftOfficeWord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: MicrosoftOfficeWord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: MicrosoftOfficeWord.exe
              Source: Binary string: Fxjvdwlxzkd.pdb source: csc.exe, 00000003.00000003.2430616893.000000000834C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899256489.0000000009830000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: MicrosoftOfficeWord.exe

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 3.2.csc.exe.99f0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.csc.exe.82d6a48.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.3899017253.0000000008252000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3899396330.00000000099F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6224, type: MEMORYSTR
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: MicrosoftOfficeWord.exeStatic PE information: real checksum: 0x6698e should be: 0x36d21b
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_0040E90C push es; ret 0_2_0040E91C
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414F64 push ecx; ret 0_2_00414F77
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E1147D push es; ret 3_2_06E11480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E151F9 push ebx; ret 3_2_06E15203
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9374B push es; retf 3_2_06E93754
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9CC50 push es; ret 3_2_06E9CD00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E99D2B push es; iretd 3_2_06E99CC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABC14E push esp; iretd 3_2_09ABC151
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_09ABB8A0 push eax; retf 3_2_09ABBA81
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 5260000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 70B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 90B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 442000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeAPI coverage: 0.9 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1816Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1816Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 3680Thread sleep count: 188 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1492Thread sleep time: -442000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 1816Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_0040F130 GetCurrentProcess,GetMappedFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,0_2_0040F130
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 442000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: csc.exe, 00000003.00000002.3898253017.000000000535A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_06E9FAC0 LdrInitializeThunk,3_2_06E9FAC0
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414A32 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00414A32
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_0040D830 GetModuleFileNameW,SHGetSpecialFolderPathW,GetProcessHeap,HeapAlloc,SHGetSpecialFolderPathW,GetWindowsDirectoryW,GetProcessHeap,HeapAlloc,0_2_0040D830
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414A32 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00414A32
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414BA6 SetUnhandledExceptionFilter,0_2_00414BA6
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_004146B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004146B4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4B00000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4B00000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4B00000Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4D6F008Jump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00411F70 OpenProcessToken,GetLastError,DuplicateTokenEx,GetLastError,AllocateAndInitializeSid,GetLastError,CreateWellKnownSid,GetLastError,GetProcessHeap,HeapAlloc,GetLastError,CreateWellKnownSid,GetLastError,CreateRestrictedToken,GetLastError,AllocateAndInitializeSid,GetLastError,SetTokenInformation,GetLastError,CloseHandle,CloseHandle,FreeSid,GetProcessHeap,HeapFree,FreeSid,CloseHandle,0_2_00411F70
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414851 cpuid 0_2_00414851
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MicrosoftOfficeWord.exeCode function: 0_2_00414C65 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00414C65
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: csc.exe, 00000003.00000002.3898253017.000000000535A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
              Windows Management Instrumentation
              1
              DLL Side-Loading
              31
              Process Injection
              11
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              141
              Virtualization/Sandbox Evasion
              LSASS Memory151
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Process Injection
              Security Account Manager141
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture1
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials134
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MicrosoftOfficeWord.exe66%ReversingLabsWin32.Trojan.Leonem
              MicrosoftOfficeWord.exe69%VirustotalBrowse
              MicrosoftOfficeWord.exe100%AviraTR/Crypt.XPACK.Gen3
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              newstaticfreepoint24.ddns-ip.net
              181.71.216.203
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://github.com/mgravell/protobuf-netcsc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://github.com/mgravell/protobuf-neticsc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354csc.exe, 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netJcsc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://zoom.us/privacy/ZoomMicrosoftOfficeWord.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000003.00000002.3898686850.000000000730D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3898686850.0000000007147000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354csc.exe, 00000003.00000003.2430616893.0000000008665000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3899423837.0000000009A50000.00000004.08000000.00040000.00000000.sdmp, csc.exe, 00000003.00000003.2430616893.000000000852E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                181.71.216.203
                                newstaticfreepoint24.ddns-ip.netColombia
                                27831ColombiaMovilCOfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1587447
                                Start date and time:2025-01-10 11:47:41 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 28s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Run name:Run with higher sleep bypass
                                Number of analysed new started processes analysed:5
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:MicrosoftOfficeWord.exe
                                Detection:MAL
                                Classification:mal80.evad.winEXE@3/0@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 89%
                                • Number of executed functions: 94
                                • Number of non-executed functions: 62
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                No simulations
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                181.71.216.203AdobePDF.exeGet hashmaliciousUnknownBrowse
                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                    MicrosoftWORD.exeGet hashmaliciousUnknownBrowse
                                      PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                        AdobePDF.exeGet hashmaliciousUnknownBrowse
                                          AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                            PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                              AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  newstaticfreepoint24.ddns-ip.netAdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  MicrosoftWORD.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                  • 181.71.216.203
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ColombiaMovilCOAdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  MicrosoftWORD.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobeReaderPDFonline.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  PDFonlineseguro.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  AdobePremierPDF.exeGet hashmaliciousUnknownBrowse
                                                  • 181.71.216.203
                                                  1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • 179.15.136.6
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.133380080323117
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:MicrosoftOfficeWord.exe
                                                  File size:3'567'616 bytes
                                                  MD5:2db79d70849a29f5c04cdc4ef1e40674
                                                  SHA1:69104324e2f4c6516ccfaf1ac86012a1376bd2f7
                                                  SHA256:92e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0
                                                  SHA512:f4b7fb079d320bdad76c47a6f61ac7dc61f7c5159df65292645e3046c63bb4e02438bb06eff37a98297163b6c53f1d313c4dd5ec4b1ff1aceae07356831d957e
                                                  SSDEEP:49152:Usxci/uNQrNcXei/uNXQVNcXei/uNQ4NcXei/uNkqO10oh7JDfglOXv:U84N8NtNfqW0udfglOf
                                                  TLSH:46F58CB8E76FEC42D8216A7F1092634E0323DEFE594385975248F764A4B3EC439E8467
                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........rt..............k.......f.......f.......f.......f.......{.......{.......f.......f..........=....f.......f...............f.....
                                                  Icon Hash:e082c4e4ae8c82e8
                                                  Entrypoint:0x414670
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x6743E4D1 [Mon Nov 25 02:45:37 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:73fea8e21025ec6f368037fae3afc60a
                                                  Signature Valid:
                                                  Signature Issuer:
                                                  Signature Validation Error:
                                                  Error Number:
                                                  Not Before, Not After
                                                    Subject Chain
                                                      Version:
                                                      Thumbprint MD5:
                                                      Thumbprint SHA-1:
                                                      Thumbprint SHA-256:
                                                      Serial:
                                                      Instruction
                                                      call 00007F825C80CDC2h
                                                      jmp 00007F825C80C5EDh
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, dword ptr [ebp+08h]
                                                      push dword ptr [esi]
                                                      call 00007F825C80CFE3h
                                                      push dword ptr [ebp+14h]
                                                      mov dword ptr [esi], eax
                                                      push dword ptr [ebp+10h]
                                                      push dword ptr [ebp+0Ch]
                                                      push esi
                                                      push 00413F30h
                                                      push 00429024h
                                                      call 00007F825C80CF14h
                                                      add esp, 1Ch
                                                      pop esi
                                                      pop ebp
                                                      ret
                                                      jmp 00007F825C80BFF6h
                                                      push ebp
                                                      mov ebp, esp
                                                      push 00000000h
                                                      call dword ptr [0041932Ch]
                                                      push dword ptr [ebp+08h]
                                                      call dword ptr [00419324h]
                                                      push C0000409h
                                                      call dword ptr [00419270h]
                                                      push eax
                                                      call dword ptr [00419368h]
                                                      pop ebp
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      sub esp, 00000324h
                                                      push 00000017h
                                                      call dword ptr [00419330h]
                                                      test eax, eax
                                                      je 00007F825C80C787h
                                                      push 00000002h
                                                      pop ecx
                                                      int 29h
                                                      mov dword ptr [0042CB80h], eax
                                                      mov dword ptr [0042CB7Ch], ecx
                                                      mov dword ptr [0042CB78h], edx
                                                      mov dword ptr [0042CB74h], ebx
                                                      mov dword ptr [0042CB70h], esi
                                                      mov dword ptr [0042CB6Ch], edi
                                                      mov word ptr [0042CB98h], ss
                                                      mov word ptr [0042CB8Ch], cs
                                                      mov word ptr [0042CB68h], ds
                                                      mov word ptr [0042CB64h], es
                                                      mov word ptr [00000000h], fs
                                                      Programming Language:
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x248e80x1cc.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x33becc.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x588000x5f38.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x2acc.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x21cd80x70.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x21e400x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x21d480x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x190000x5b8.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x180000x17e00194a7255282fe9d7ae81b72636d3958eFalse0.4041639397905759data6.147389640020991IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x190000x100000xf400705b94a546f1abb8fba1e84ce4933d03False0.29005507172131145data5.0324726546167895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x290000x50000x3a0022c50ae1b95257f8c3a44ff7a2de2c94False0.10162984913793104data2.0443500313558287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x2e0000x33becc0x33c0004d3fa0f36523000af465d39a2916abf9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_CURSOR0x2e72c0x2ecdata0.56951871657754
                                                      RT_CURSOR0x2ea180x2ecTarga image data 64 x 65536 x 1 +32 "\004"0.4117647058823529
                                                      RT_BITMAP0x2ed040x5428Device independent bitmap graphic, 224 x 32 x 24, image size 0, resolution 3780 x 3780 px/m0.1578165614556257
                                                      RT_BITMAP0x3412c0xbd28Device independent bitmap graphic, 336 x 48 x 24, image size 0, resolution 3780 x 3780 px/m0.13666776804890138
                                                      RT_BITMAP0x3fe540x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.5168697022617881
                                                      RT_BITMAP0xb28780x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.6944626655875964
                                                      RT_BITMAP0x12529c0x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.701893342420241
                                                      RT_BITMAP0x197cc00x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.7138369467989948
                                                      RT_ICON0x20a6e40xc5c0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.6268963337547409
                                                      RT_ICON0x216ca40x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.1756923691451904
                                                      RT_ICON0x258ccc0x6375fPC bitmap, Windows 3.x format, 51811 x 2 x 49, image size 407651, cbSize 407391, bits offset 540.9921942310949432
                                                      RT_ICON0x2bc42c0x528Device independent bitmap graphic, 16 x 32 x 32, image size 1280EnglishUnited States0.4401515151515151
                                                      RT_ICON0x2bc9540xb68Device independent bitmap graphic, 24 x 48 x 32, image size 2880EnglishUnited States0.29486301369863016
                                                      RT_ICON0x2bd4bc0x1428Device independent bitmap graphic, 32 x 64 x 32, image size 5120EnglishUnited States0.23507751937984497
                                                      RT_ICON0x2be8e40x2d28Device independent bitmap graphic, 48 x 96 x 32, image size 11520EnglishUnited States0.17439446366782008
                                                      RT_ICON0x2c160c0x5028Device independent bitmap graphic, 64 x 128 x 32, image size 20480EnglishUnited States0.12339181286549708
                                                      RT_ICON0x2c66340x14028Device independent bitmap graphic, 128 x 256 x 32, image size 81920EnglishUnited States0.0954123962908736
                                                      RT_ICON0x2da65c0xc16dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0005250721974273
                                                      RT_RCDATA0x2e67cc0xfd8PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0027120315581854
                                                      RT_RCDATA0x2e77a40x9d36PNG image data, 98 x 102, 8-bit/color RGBA, non-interlaced0.33521343736023457
                                                      RT_RCDATA0x2f14dc0x9d36PNG image data, 98 x 102, 8-bit/color RGBA, non-interlaced0.24362669582070268
                                                      RT_RCDATA0x2fb2140xcbf0Delphi compiled form 'TfFileProperties'0.31453034017775056
                                                      RT_RCDATA0x307e040x3c248Delphi compiled form 'TfMain'0.6290065924073653
                                                      RT_GROUP_ICON0x34404c0x68dataEnglishUnited States0.7403846153846154
                                                      RT_VERSION0x3440b40x364dataEnglishUnited States0.43317972350230416
                                                      RT_ANIICON0x3444180x25932PC bitmap, Windows 3.x format, 19581 x 2 x 38, image size 154747, cbSize 153906, bits offset 540.9913128792899563
                                                      RT_MANIFEST0x369d4c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                      DLLImport
                                                      KERNEL32.dllGetCurrentThreadId, QueryDosDeviceW, VirtualProtect, HeapFree, EnterCriticalSection, GetCurrentProcess, ReleaseSemaphore, WriteFile, GetModuleFileNameW, WaitForMultipleObjects, LeaveCriticalSection, InitializeCriticalSection, SetFilePointer, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, CreateEventW, Process32NextW, CreateFileA, SetEvent, Process32FirstW, FreeLibrary, HeapAlloc, GetWindowsDirectoryW, VerSetConditionMask, GetProcessHeap, GetModuleHandleW, CreateSemaphoreW, FlushInstructionCache, VerifyVersionInfoW, CreateDirectoryA, SetDllDirectoryW, VirtualQuery, LoadLibraryExW, FlushFileBuffers, LocalFree, SetErrorMode, GetPrivateProfileStringW, GetTempFileNameW, CreateFileW, OutputDebugStringW, IsWow64Process, MultiByteToWideChar, SetConsoleCtrlHandler, IsDebuggerPresent, InitializeCriticalSectionAndSpinCount, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, CreateThread, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetProcAddress, LoadLibraryW, ExitProcess, DeleteCriticalSection, CloseHandle, DeleteFileW, TerminateThread, GetLastError, GetTickCount64, Sleep, WaitForSingleObject, InitializeCriticalSectionEx, TerminateProcess, CreateDirectoryW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead
                                                      USER32.dllGetMessageW, GetUserObjectInformationA, SetTimer, TranslateMessage, PostThreadMessageW, DispatchMessageW, GetProcessWindowStation, MessageBoxW
                                                      ADVAPI32.dllGetTokenInformation, RegGetValueW, RegOpenKeyExW, OpenProcessToken, RegEnumKeyExW, RegCloseKey, DuplicateTokenEx, FreeSid, CreateRestrictedToken, ImpersonateLoggedOnUser, CreateWellKnownSid, AllocateAndInitializeSid, SetTokenInformation, RevertToSelf
                                                      SHELL32.dllSHGetKnownFolderPath, SHGetSpecialFolderPathW, ShellExecuteExW, SHGetSpecialFolderPathA
                                                      ole32.dllCoInitialize, CoUninitialize, CoTaskMemFree, CoInitializeEx, CoSetProxyBlanket, OleRun, CoCreateInstance
                                                      OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
                                                      SHLWAPI.dllPathAppendW, PathIsRelativeW
                                                      PSAPI.DLLGetModuleInformation, GetModuleFileNameExW, GetMappedFileNameW, EnumProcessModules
                                                      WINTRUST.dllWinVerifyTrust, WTHelperProvDataFromStateData, WTHelperGetProvCertFromChain, WTHelperGetProvSignerFromChain
                                                      CRYPT32.dllCertGetNameStringW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 11:48:50.511622906 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:48:50.516383886 CET3020349710181.71.216.203192.168.2.5
                                                      Jan 10, 2025 11:48:50.516474962 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:48:50.546437979 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:48:50.551254988 CET3020349710181.71.216.203192.168.2.5
                                                      Jan 10, 2025 11:48:50.551345110 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:48:50.556159973 CET3020349710181.71.216.203192.168.2.5
                                                      Jan 10, 2025 11:49:11.876615047 CET3020349710181.71.216.203192.168.2.5
                                                      Jan 10, 2025 11:49:11.876773119 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:49:11.880669117 CET4971030203192.168.2.5181.71.216.203
                                                      Jan 10, 2025 11:49:11.885503054 CET3020349710181.71.216.203192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 11:48:50.494369984 CET5325053192.168.2.51.1.1.1
                                                      Jan 10, 2025 11:48:50.509396076 CET53532501.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 11:48:50.494369984 CET192.168.2.51.1.1.10x4ec9Standard query (0)newstaticfreepoint24.ddns-ip.netA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 11:48:50.509396076 CET1.1.1.1192.168.2.50x4ec9No error (0)newstaticfreepoint24.ddns-ip.net181.71.216.203A (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:05:48:30
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\MicrosoftOfficeWord.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\MicrosoftOfficeWord.exe"
                                                      Imagebase:0x400000
                                                      File size:3'567'616 bytes
                                                      MD5 hash:2DB79D70849A29F5C04CDC4EF1E40674
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:05:48:46
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                      Imagebase:0x430000
                                                      File size:2'141'552 bytes
                                                      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000003.00000002.3899017253.0000000008252000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000003.00000002.3899396330.00000000099F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000003.00000002.3898686850.00000000070B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:0.7%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:8
                                                        Total number of Limit Nodes:1
                                                        execution_graph 11659 4144e2 11673 403fe4 11659->11673 11676 4040bb 11673->11676 11674 40a472 ExitProcess 11675 406925 11676->11674 11676->11675 11677 4085bd 11678 4085cb VirtualProtect 11677->11678 11681 40864f ExitProcess 11678->11681
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_
                                                        • String ID: E$GetModuleHandleExW$L$L$LoadLibraryW$P$P$V$W$]$a$a$a$b$bmp$c$c$d$e$e$gif$i$i$i$jpg$l$o$o$o$png$r$r$r$r$r$s$s$t$t$t$t$u$x$y
                                                        • API String ID: 2427045233-3217341300
                                                        • Opcode ID: 24c789fa4daecbd349568caf682134c91fe02bd9c879d5a9ec86189862ec8d49
                                                        • Instruction ID: 8772a5d91f2c69b3084cbf90925906af69786a0451df771bb4d847c438c2977d
                                                        • Opcode Fuzzy Hash: 24c789fa4daecbd349568caf682134c91fe02bd9c879d5a9ec86189862ec8d49
                                                        • Instruction Fuzzy Hash: 20D208B4A052A8CBDB24CB18C988BDDBBB1AF45314F1081EAE459BB381D7755F81CF19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$E$G$H$L$L$L$L$M$P$W$W$W$a$a$a$a$a$b$b$c$d$d$d$d$e$e$e$e$i$i$i$l$l$n$o$o$o$o$r$r$r$r$r$s$s$t$t$u$x$x$y$y
                                                        • API String ID: 0-1389426690
                                                        • Opcode ID: 6c52c70809327a56088b94180972d0ec2f26b9a01d5ece6e06692af3203bd157
                                                        • Instruction ID: 736e9a2ff06c9903231fdc911306428f10f64ae89d11f3f6351f21f0fe3a524d
                                                        • Opcode Fuzzy Hash: 6c52c70809327a56088b94180972d0ec2f26b9a01d5ece6e06692af3203bd157
                                                        • Instruction Fuzzy Hash: 90D11D64A086E8CBEB21CB24CC487C9BB75AF55704F0450E9914CAB391D7BA4FC4CF2A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$E$G$H$L$L$L$L$M$P$W$W$W$a$a$a$a$a$b$b$c$d$d$d$d$e$e$e$e$i$i$i$l$l$n$o$o$o$o$r$r$r$r$r$s$s$t$t$u$x$x$y$y
                                                        • API String ID: 0-1389426690
                                                        • Opcode ID: 282d2022df174df892bc0fa8082b37abe8beab81664315bf64815537b9bee3b7
                                                        • Instruction ID: 5a33921d472eb5b1d54932414b158a79c7060a2ea52495a653e6a93cb6c8b944
                                                        • Opcode Fuzzy Hash: 282d2022df174df892bc0fa8082b37abe8beab81664315bf64815537b9bee3b7
                                                        • Instruction Fuzzy Hash: 68C1E0749086E8CAEB21CB24CD447D9BAB5AF55708F0441E9914C7B391D7BA4FC4CF2A
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 544645111-215400123
                                                        • Opcode ID: 6f1aed589faa056a0852ec4fa35efdb10074c7c864bb1c776dfdcc7162dddfda
                                                        • Instruction ID: 680e258f425ee6c68fe86b2117ead666fda9975553f3b758cf5b8f653f7fc27b
                                                        • Opcode Fuzzy Hash: 6f1aed589faa056a0852ec4fa35efdb10074c7c864bb1c776dfdcc7162dddfda
                                                        • Instruction Fuzzy Hash: E6222BB4E042A98BDB24CB14C984BE9BBB1AF44304F1081E9E548BB781D7755FC1CF59
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 544645111-215400123
                                                        • Opcode ID: f7c28a94e09f94054dd5d783e1d24e2702e967a16eb50db53d6b77a3e3e9e812
                                                        • Instruction ID: 9b5f17017330220ca9fff1c45d645742c72bd43d93c1bf5158f13f9b32c0fa46
                                                        • Opcode Fuzzy Hash: f7c28a94e09f94054dd5d783e1d24e2702e967a16eb50db53d6b77a3e3e9e812
                                                        • Instruction Fuzzy Hash: A81205B4A042A88BDB24CB18C984BEDBBB1AF54314F1045EAE459BB381D7795FC1CF19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: 331e01e38dd0f510206513c9ea5a78eff6aa6bc09356ec22b1eb7b402da7404d
                                                        • Instruction ID: 2adf2b18feb625bed8cfcb78b62098ecdcb4c0a0e1b3b05bb58cff684be47f1c
                                                        • Opcode Fuzzy Hash: 331e01e38dd0f510206513c9ea5a78eff6aa6bc09356ec22b1eb7b402da7404d
                                                        • Instruction Fuzzy Hash: 7CE104B4A042A88BDB25CB24C948BD9BBB1BF54714F1051EAE04DBB381D7794F85CF1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: 7f62187aef5625279c27ea7d94b2c2c094b0ce3406f1ae28e1879990c4459e22
                                                        • Instruction ID: 1df6281eaa33ee93b9c615ee13f399540a00456e0d95a1d980fabfb698b6a851
                                                        • Opcode Fuzzy Hash: 7f62187aef5625279c27ea7d94b2c2c094b0ce3406f1ae28e1879990c4459e22
                                                        • Instruction Fuzzy Hash: 27A1C3B4A082A88BDB21CB28CD447D9BBB1AF55704F1041E9E14CBB381D7794F85CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: dcdebe5f72c0ccc379f0a9a28b8152a2cbb9d2d85e5b684ba006bc1f1b1b4051
                                                        • Instruction ID: dd75d956de814c05ae4584f52afdb768220d78640f5e590803b18e4e1626968d
                                                        • Opcode Fuzzy Hash: dcdebe5f72c0ccc379f0a9a28b8152a2cbb9d2d85e5b684ba006bc1f1b1b4051
                                                        • Instruction Fuzzy Hash: 3891C2B4A082A88BDB218B28C9487D9BBB1AF55704F1045E9E14CBB381D7794F85CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: 3ee205ec0df50246e207656a30364f65ceff2ff80cf25e697aceff67b9a198bf
                                                        • Instruction ID: 0a7123dfe8a5327e98d8b2165b2be4c7d76cd1d813a51559d9bb141b6610bf7c
                                                        • Opcode Fuzzy Hash: 3ee205ec0df50246e207656a30364f65ceff2ff80cf25e697aceff67b9a198bf
                                                        • Instruction Fuzzy Hash: 2E91C3B4A082A8CBDB218B28C9447D9BBB1AF55704F1045E9E14CBB381D77A4F85CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: 80adb4852b0960b0d3162291facd05290ea9be920a23199fe1d5f1715aae6800
                                                        • Instruction ID: 8002ac30c2fbda6335aa2e2110aad2d2e01338a9879cba067224349d9c433c38
                                                        • Opcode Fuzzy Hash: 80adb4852b0960b0d3162291facd05290ea9be920a23199fe1d5f1715aae6800
                                                        • Instruction Fuzzy Hash: 2481C6B4A082A8CBDB21CB24CD447D9BBB5AB55704F0045E9A14CAB381C7B94F85CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 0-215400123
                                                        • Opcode ID: e80f974e5b24f2e604f31b36c1f62663b58aceb74e947806e38518b29f20a73d
                                                        • Instruction ID: 42eea9e0e97cf5b612de837b8b02b13f81132edb7b819d993aa0766d76aa8ddb
                                                        • Opcode Fuzzy Hash: e80f974e5b24f2e604f31b36c1f62663b58aceb74e947806e38518b29f20a73d
                                                        • Instruction Fuzzy Hash: 6171C8B49082A8CBEB21CB24CD447D9BAB5AF15704F1045E9E14CBB381C7BA4F85CF5A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2143 407c9a-4080fd 2145 408142-408154 2143->2145 2146 4080ff-40813d 2143->2146 2148 408156-408162 2145->2148 2149 408167-408171 2145->2149 2147 40861c-40864d VirtualProtect 2146->2147 2151 408686-408794 2147->2151 2152 40864f-408681 2147->2152 2148->2147 2153 408799-408964 2151->2153 2152->2153 2157 4089a4-4089ef 2153->2157 2158 408966-40899f 2153->2158 2159 4089f1-408a2a 2157->2159 2160 408a2f-408a35 2157->2160 2161 408d30-408d34 2158->2161 2159->2161 2162 408a3b-408ac2 2160->2162 2163 408d3a-408f89 2161->2163 2164 4099cb-409ac2 2161->2164 2167 408ac6-408bb6 2162->2167 2168 408f8b-408fc7 2163->2168 2169 408fcc-409017 2163->2169 2165 409b02-409b4d 2164->2165 2166 409ac4-409afd 2164->2166 2173 409b8d-409b93 2165->2173 2174 409b4f-409b88 2165->2174 2172 409e8e-409f47 2166->2172 2175 408bb8-408bc8 2167->2175 2176 408bcd-408bd7 2167->2176 2177 409361-409368 2168->2177 2170 409019-409055 2169->2170 2171 40905a-409060 2169->2171 2170->2177 2180 409066-4090ed 2171->2180 2181 409f49-409f87 2172->2181 2182 409f8c-409f9e 2172->2182 2183 409b99-409c20 2173->2183 2174->2172 2184 408c50-408c57 2175->2184 2176->2167 2185 408bdd-408bea 2176->2185 2178 40936a-4093a6 2177->2178 2179 4093ab-409403 2177->2179 2186 40a472-40a477 ExitProcess 2178->2186 2187 409405-409443 2179->2187 2188 409448-40945a 2179->2188 2191 4090f1-4091e1 2180->2191 2192 40a466-40a46c 2181->2192 2193 409fa0-409fac 2182->2193 2194 409fb1-40a002 2182->2194 2195 409c24-409d14 2183->2195 2189 408c99-408ce5 2184->2189 2190 408c59-408c94 2184->2190 2185->2167 2196 408bf0-408c2c 2185->2196 2197 409922-409929 2187->2197 2198 40945c-409468 2188->2198 2199 40946d-4094be 2188->2199 2200 408cf7-408d29 2189->2200 2201 408ce7-408cf1 2189->2201 2190->2161 2202 4091e3-4091f3 2191->2202 2203 4091f8-409202 2191->2203 2192->2186 2193->2192 2206 40a004-40a042 2194->2206 2207 40a047-40a088 2194->2207 2204 409d16-409d26 2195->2204 2205 409d2b-409d35 2195->2205 2208 408c3a 2196->2208 2209 408c2e-408c38 2196->2209 2197->2164 2213 40992f-409988 2197->2213 2198->2197 2214 4094c0-4094fe 2199->2214 2215 409503-409544 2199->2215 2200->2161 2201->2162 2201->2200 2218 40927b-409282 2202->2218 2203->2191 2219 409208-409215 2203->2219 2216 409dae-409db5 2204->2216 2205->2195 2217 409d3b-409d48 2205->2217 2206->2192 2211 40a08a-40a0c8 2207->2211 2212 40a0cd-40a191 2207->2212 2210 408c44-408c4a 2208->2210 2209->2210 2210->2184 2211->2192 2237 40a197-40a26e 2212->2237 2238 40a45a-40a460 2212->2238 2213->2164 2242 40998a-4099c6 2213->2242 2214->2197 2224 409546-409584 2215->2224 2225 409589-40964d 2215->2225 2222 409df7-409e43 2216->2222 2223 409db7-409df2 2216->2223 2217->2195 2220 409d4e-409d8a 2217->2220 2227 409284-4092c2 2218->2227 2228 4092c7-409313 2218->2228 2219->2191 2226 40921b-409257 2219->2226 2233 409d98 2220->2233 2234 409d8c-409d96 2220->2234 2235 409e55-409e87 2222->2235 2236 409e45-409e4f 2222->2236 2223->2172 2224->2197 2243 409653-40972a 2225->2243 2244 409916-40991c 2225->2244 2239 409265 2226->2239 2240 409259-409263 2226->2240 2227->2177 2229 409325-409357 2228->2229 2230 409315-40931f 2228->2230 2229->2177 2230->2180 2230->2229 2241 409da2-409da8 2233->2241 2234->2241 2235->2172 2236->2183 2236->2235 2245 40a279-40a287 2237->2245 2238->2192 2246 40926f-409275 2239->2246 2240->2246 2241->2216 2242->2186 2247 409735-409743 2243->2247 2244->2197 2248 40a315-40a360 2245->2248 2249 40a28d-40a29a 2245->2249 2246->2218 2252 4097d1-40981c 2247->2252 2253 409749-409756 2247->2253 2250 40a371-40a3c2 2248->2250 2251 40a362-40a36c 2248->2251 2249->2248 2254 40a29c-40a2e7 2249->2254 2256 40a3d0-40a402 2250->2256 2257 40a3c4-40a3ce 2250->2257 2255 40a40c-40a413 2251->2255 2259 40982d-40987e 2252->2259 2260 40981e-409828 2252->2260 2253->2252 2258 409758-4097a3 2253->2258 2261 40a307 2254->2261 2262 40a2e9-40a305 2254->2262 2264 40a455 2255->2264 2265 40a415-40a453 2255->2265 2256->2255 2257->2255 2269 4097c3 2258->2269 2270 4097a5-4097c1 2258->2270 2267 409880-40988a 2259->2267 2268 40988c-4098be 2259->2268 2266 4098c8-4098cf 2260->2266 2261->2245 2262->2261 2271 40a30e 2262->2271 2264->2238 2265->2192 2274 409911 2266->2274 2275 4098d1-40990f 2266->2275 2267->2266 2268->2266 2269->2247 2270->2269 2272 4097ca 2270->2272 2271->2248 2272->2252 2274->2244 2275->2197
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 544645111-215400123
                                                        • Opcode ID: d0b0a7fe9d406b5fe98e0eefc5c2cdd973b16e86ce0152bcd6a534d4b6762cda
                                                        • Instruction ID: ec2d891c00d131031af488a7aeab7433c2fa4461e8dab624ac9fccc522e3d025
                                                        • Opcode Fuzzy Hash: d0b0a7fe9d406b5fe98e0eefc5c2cdd973b16e86ce0152bcd6a534d4b6762cda
                                                        • Instruction Fuzzy Hash: 7871C9B49082A8CBEB21CB24CD447D9BAB5AF15704F1045E9D14CBB381C77A4F85CF1A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2276 4085bd-4085c9 2277 40860b-408616 2276->2277 2278 4085cb-408609 2276->2278 2279 40861c-40864d VirtualProtect 2277->2279 2278->2279 2282 408686-4086f7 2279->2282 2283 40864f-408681 2279->2283 2285 40872f-408794 2282->2285 2284 408799-408964 2283->2284 2288 4089a4-4089ef 2284->2288 2289 408966-40899f 2284->2289 2285->2284 2290 4089f1-408a2a 2288->2290 2291 408a2f-408a35 2288->2291 2292 408d30-408d34 2289->2292 2290->2292 2293 408a3b-408ac2 2291->2293 2294 408d3a-408f89 2292->2294 2295 4099cb-409ac2 2292->2295 2298 408ac6-408bb6 2293->2298 2299 408f8b-408fc7 2294->2299 2300 408fcc-409017 2294->2300 2296 409b02-409b4d 2295->2296 2297 409ac4-409afd 2295->2297 2304 409b8d-409b93 2296->2304 2305 409b4f-409b88 2296->2305 2303 409e8e-409f47 2297->2303 2306 408bb8-408bc8 2298->2306 2307 408bcd-408bd7 2298->2307 2308 409361-409368 2299->2308 2301 409019-409055 2300->2301 2302 40905a-409060 2300->2302 2301->2308 2311 409066-4090ed 2302->2311 2312 409f49-409f87 2303->2312 2313 409f8c-409f9e 2303->2313 2314 409b99-409c20 2304->2314 2305->2303 2315 408c50-408c57 2306->2315 2307->2298 2316 408bdd-408bea 2307->2316 2309 40936a-4093a6 2308->2309 2310 4093ab-409403 2308->2310 2317 40a472-40a477 ExitProcess 2309->2317 2318 409405-409443 2310->2318 2319 409448-40945a 2310->2319 2322 4090f1-4091e1 2311->2322 2323 40a466-40a46c 2312->2323 2324 409fa0-409fac 2313->2324 2325 409fb1-40a002 2313->2325 2326 409c24-409d14 2314->2326 2320 408c99-408ce5 2315->2320 2321 408c59-408c94 2315->2321 2316->2298 2327 408bf0-408c2c 2316->2327 2328 409922-409929 2318->2328 2329 40945c-409468 2319->2329 2330 40946d-4094be 2319->2330 2331 408cf7-408d29 2320->2331 2332 408ce7-408cf1 2320->2332 2321->2292 2333 4091e3-4091f3 2322->2333 2334 4091f8-409202 2322->2334 2323->2317 2324->2323 2337 40a004-40a042 2325->2337 2338 40a047-40a088 2325->2338 2335 409d16-409d26 2326->2335 2336 409d2b-409d35 2326->2336 2339 408c3a 2327->2339 2340 408c2e-408c38 2327->2340 2328->2295 2344 40992f-409988 2328->2344 2329->2328 2345 4094c0-4094fe 2330->2345 2346 409503-409544 2330->2346 2331->2292 2332->2293 2332->2331 2349 40927b-409282 2333->2349 2334->2322 2350 409208-409215 2334->2350 2347 409dae-409db5 2335->2347 2336->2326 2348 409d3b-409d48 2336->2348 2337->2323 2342 40a08a-40a0c8 2338->2342 2343 40a0cd-40a191 2338->2343 2341 408c44-408c4a 2339->2341 2340->2341 2341->2315 2342->2323 2368 40a197-40a26e 2343->2368 2369 40a45a-40a460 2343->2369 2344->2295 2373 40998a-4099c6 2344->2373 2345->2328 2355 409546-409584 2346->2355 2356 409589-40964d 2346->2356 2353 409df7-409e43 2347->2353 2354 409db7-409df2 2347->2354 2348->2326 2351 409d4e-409d8a 2348->2351 2358 409284-4092c2 2349->2358 2359 4092c7-409313 2349->2359 2350->2322 2357 40921b-409257 2350->2357 2364 409d98 2351->2364 2365 409d8c-409d96 2351->2365 2366 409e55-409e87 2353->2366 2367 409e45-409e4f 2353->2367 2354->2303 2355->2328 2374 409653-40972a 2356->2374 2375 409916-40991c 2356->2375 2370 409265 2357->2370 2371 409259-409263 2357->2371 2358->2308 2360 409325-409357 2359->2360 2361 409315-40931f 2359->2361 2360->2308 2361->2311 2361->2360 2372 409da2-409da8 2364->2372 2365->2372 2366->2303 2367->2314 2367->2366 2376 40a279-40a287 2368->2376 2369->2323 2377 40926f-409275 2370->2377 2371->2377 2372->2347 2373->2317 2378 409735-409743 2374->2378 2375->2328 2379 40a315-40a360 2376->2379 2380 40a28d-40a29a 2376->2380 2377->2349 2383 4097d1-40981c 2378->2383 2384 409749-409756 2378->2384 2381 40a371-40a3c2 2379->2381 2382 40a362-40a36c 2379->2382 2380->2379 2385 40a29c-40a2e7 2380->2385 2387 40a3d0-40a402 2381->2387 2388 40a3c4-40a3ce 2381->2388 2386 40a40c-40a413 2382->2386 2390 40982d-40987e 2383->2390 2391 40981e-409828 2383->2391 2384->2383 2389 409758-4097a3 2384->2389 2392 40a307 2385->2392 2393 40a2e9-40a305 2385->2393 2395 40a455 2386->2395 2396 40a415-40a453 2386->2396 2387->2386 2388->2386 2400 4097c3 2389->2400 2401 4097a5-4097c1 2389->2401 2398 409880-40988a 2390->2398 2399 40988c-4098be 2390->2399 2397 4098c8-4098cf 2391->2397 2392->2376 2393->2392 2402 40a30e 2393->2402 2395->2369 2396->2323 2405 409911 2397->2405 2406 4098d1-40990f 2397->2406 2398->2397 2399->2397 2400->2378 2401->2400 2403 4097ca 2401->2403 2402->2379 2403->2383 2405->2375 2406->2328
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 544645111-215400123
                                                        • Opcode ID: cd97989d0c3b1013a5e7116e7ab31a4db66f0d0539c0911fbc3551e6ae52f1fe
                                                        • Instruction ID: 625d281dfe30ccee287b8e8f0ea624e1b992baa3afb4f701c74c0ff8d4e14b8f
                                                        • Opcode Fuzzy Hash: cd97989d0c3b1013a5e7116e7ab31a4db66f0d0539c0911fbc3551e6ae52f1fe
                                                        • Instruction Fuzzy Hash: 1161C8B49082A8CAEB21CB24CD447D9BAB5AF15704F0445E9D14CBB391C7BA4F85CF2A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2407 4080fe-40864d VirtualProtect 2410 408686-408794 2407->2410 2411 40864f-408681 2407->2411 2412 408799-408964 2410->2412 2411->2412 2416 4089a4-4089ef 2412->2416 2417 408966-40899f 2412->2417 2418 4089f1-408a2a 2416->2418 2419 408a2f-408a35 2416->2419 2420 408d30-408d34 2417->2420 2418->2420 2421 408a3b-408ac2 2419->2421 2422 408d3a-408f89 2420->2422 2423 4099cb-409ac2 2420->2423 2426 408ac6-408bb6 2421->2426 2427 408f8b-408fc7 2422->2427 2428 408fcc-409017 2422->2428 2424 409b02-409b4d 2423->2424 2425 409ac4-409afd 2423->2425 2432 409b8d-409b93 2424->2432 2433 409b4f-409b88 2424->2433 2431 409e8e-409f47 2425->2431 2434 408bb8-408bc8 2426->2434 2435 408bcd-408bd7 2426->2435 2436 409361-409368 2427->2436 2429 409019-409055 2428->2429 2430 40905a-409060 2428->2430 2429->2436 2439 409066-4090ed 2430->2439 2440 409f49-409f87 2431->2440 2441 409f8c-409f9e 2431->2441 2442 409b99-409c20 2432->2442 2433->2431 2443 408c50-408c57 2434->2443 2435->2426 2444 408bdd-408bea 2435->2444 2437 40936a-4093a6 2436->2437 2438 4093ab-409403 2436->2438 2445 40a472-40a477 ExitProcess 2437->2445 2446 409405-409443 2438->2446 2447 409448-40945a 2438->2447 2450 4090f1-4091e1 2439->2450 2451 40a466-40a46c 2440->2451 2452 409fa0-409fac 2441->2452 2453 409fb1-40a002 2441->2453 2454 409c24-409d14 2442->2454 2448 408c99-408ce5 2443->2448 2449 408c59-408c94 2443->2449 2444->2426 2455 408bf0-408c2c 2444->2455 2456 409922-409929 2446->2456 2457 40945c-409468 2447->2457 2458 40946d-4094be 2447->2458 2459 408cf7-408d29 2448->2459 2460 408ce7-408cf1 2448->2460 2449->2420 2461 4091e3-4091f3 2450->2461 2462 4091f8-409202 2450->2462 2451->2445 2452->2451 2465 40a004-40a042 2453->2465 2466 40a047-40a088 2453->2466 2463 409d16-409d26 2454->2463 2464 409d2b-409d35 2454->2464 2467 408c3a 2455->2467 2468 408c2e-408c38 2455->2468 2456->2423 2472 40992f-409988 2456->2472 2457->2456 2473 4094c0-4094fe 2458->2473 2474 409503-409544 2458->2474 2459->2420 2460->2421 2460->2459 2477 40927b-409282 2461->2477 2462->2450 2478 409208-409215 2462->2478 2475 409dae-409db5 2463->2475 2464->2454 2476 409d3b-409d48 2464->2476 2465->2451 2470 40a08a-40a0c8 2466->2470 2471 40a0cd-40a191 2466->2471 2469 408c44-408c4a 2467->2469 2468->2469 2469->2443 2470->2451 2496 40a197-40a26e 2471->2496 2497 40a45a-40a460 2471->2497 2472->2423 2501 40998a-4099c6 2472->2501 2473->2456 2483 409546-409584 2474->2483 2484 409589-40964d 2474->2484 2481 409df7-409e43 2475->2481 2482 409db7-409df2 2475->2482 2476->2454 2479 409d4e-409d8a 2476->2479 2486 409284-4092c2 2477->2486 2487 4092c7-409313 2477->2487 2478->2450 2485 40921b-409257 2478->2485 2492 409d98 2479->2492 2493 409d8c-409d96 2479->2493 2494 409e55-409e87 2481->2494 2495 409e45-409e4f 2481->2495 2482->2431 2483->2456 2502 409653-40972a 2484->2502 2503 409916-40991c 2484->2503 2498 409265 2485->2498 2499 409259-409263 2485->2499 2486->2436 2488 409325-409357 2487->2488 2489 409315-40931f 2487->2489 2488->2436 2489->2439 2489->2488 2500 409da2-409da8 2492->2500 2493->2500 2494->2431 2495->2442 2495->2494 2504 40a279-40a287 2496->2504 2497->2451 2505 40926f-409275 2498->2505 2499->2505 2500->2475 2501->2445 2506 409735-409743 2502->2506 2503->2456 2507 40a315-40a360 2504->2507 2508 40a28d-40a29a 2504->2508 2505->2477 2511 4097d1-40981c 2506->2511 2512 409749-409756 2506->2512 2509 40a371-40a3c2 2507->2509 2510 40a362-40a36c 2507->2510 2508->2507 2513 40a29c-40a2e7 2508->2513 2515 40a3d0-40a402 2509->2515 2516 40a3c4-40a3ce 2509->2516 2514 40a40c-40a413 2510->2514 2518 40982d-40987e 2511->2518 2519 40981e-409828 2511->2519 2512->2511 2517 409758-4097a3 2512->2517 2520 40a307 2513->2520 2521 40a2e9-40a305 2513->2521 2523 40a455 2514->2523 2524 40a415-40a453 2514->2524 2515->2514 2516->2514 2528 4097c3 2517->2528 2529 4097a5-4097c1 2517->2529 2526 409880-40988a 2518->2526 2527 40988c-4098be 2518->2527 2525 4098c8-4098cf 2519->2525 2520->2504 2521->2520 2530 40a30e 2521->2530 2523->2497 2524->2451 2533 409911 2525->2533 2534 4098d1-40990f 2525->2534 2526->2525 2527->2525 2528->2506 2529->2528 2531 4097ca 2529->2531 2530->2507 2531->2511 2533->2503 2534->2456
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID: E$L$L$P$W$a$a$b$c$d$e$i$i$o$o$r$r$r$s$s$t$x$y
                                                        • API String ID: 544645111-215400123
                                                        • Opcode ID: 26e8d5b9a9d3ffa4bebdb6377f811e48dd6436d8b2e435224c717ff429529648
                                                        • Instruction ID: 376e2767f3cf7e469c955a49fa83cff2aaf57e068d71da198fb35e287fd87543
                                                        • Opcode Fuzzy Hash: 26e8d5b9a9d3ffa4bebdb6377f811e48dd6436d8b2e435224c717ff429529648
                                                        • Instruction Fuzzy Hash: F661DBB49082A8CBEB21CB24CD447D9BAB5AF55704F1445E9914CBB381D7BA4FC4CF2A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2535 409a07-409ac2 2536 409b02-409b4d 2535->2536 2537 409ac4-409afd 2535->2537 2539 409b8d-409b93 2536->2539 2540 409b4f-409b88 2536->2540 2538 409e8e-409f47 2537->2538 2541 409f49-409f87 2538->2541 2542 409f8c-409f9e 2538->2542 2543 409b99-409c20 2539->2543 2540->2538 2544 40a466-40a477 ExitProcess 2541->2544 2545 409fa0-409fac 2542->2545 2546 409fb1-40a002 2542->2546 2547 409c24-409d14 2543->2547 2545->2544 2551 40a004-40a042 2546->2551 2552 40a047-40a088 2546->2552 2549 409d16-409d26 2547->2549 2550 409d2b-409d35 2547->2550 2556 409dae-409db5 2549->2556 2550->2547 2553 409d3b-409d48 2550->2553 2551->2544 2554 40a08a-40a0c8 2552->2554 2555 40a0cd-40a191 2552->2555 2553->2547 2557 409d4e-409d8a 2553->2557 2554->2544 2565 40a197-40a26e 2555->2565 2566 40a45a-40a460 2555->2566 2559 409df7-409e43 2556->2559 2560 409db7-409df2 2556->2560 2561 409d98 2557->2561 2562 409d8c-409d96 2557->2562 2563 409e55-409e87 2559->2563 2564 409e45-409e4f 2559->2564 2560->2538 2567 409da2-409da8 2561->2567 2562->2567 2563->2538 2564->2543 2564->2563 2568 40a279-40a287 2565->2568 2566->2544 2567->2556 2569 40a315-40a360 2568->2569 2570 40a28d-40a29a 2568->2570 2571 40a371-40a3c2 2569->2571 2572 40a362-40a36c 2569->2572 2570->2569 2573 40a29c-40a2e7 2570->2573 2575 40a3d0-40a402 2571->2575 2576 40a3c4-40a3ce 2571->2576 2574 40a40c-40a413 2572->2574 2577 40a307 2573->2577 2578 40a2e9-40a305 2573->2578 2580 40a455 2574->2580 2581 40a415-40a453 2574->2581 2575->2574 2576->2574 2577->2568 2578->2577 2582 40a30e 2578->2582 2580->2566 2581->2544 2582->2569
                                                        APIs
                                                        • ExitProcess.KERNEL32(DEADBEEF), ref: 0040A477
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess
                                                        • String ID:
                                                        • API String ID: 621844428-0
                                                        • Opcode ID: 72a79fb50813daf9641634454f6812f554216fd05c69cff620f9039262b24773
                                                        • Instruction ID: c008a3a88fbbd9c5b9f150bc327e9043af79050cbe7d05808c07bc7f694a12f5
                                                        • Opcode Fuzzy Hash: 72a79fb50813daf9641634454f6812f554216fd05c69cff620f9039262b24773
                                                        • Instruction Fuzzy Hash: 20D1F7B4A042A88BCB64CF54C984BEDBBB1BB44315F2086EAE459B7751D7349EC1CF09

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2583 4097d3-40981c 2584 40982d-40987e 2583->2584 2585 40981e-409828 2583->2585 2587 409880-40988a 2584->2587 2588 40988c-4098be 2584->2588 2586 4098c8-4098cf 2585->2586 2589 409911-40991c 2586->2589 2590 4098d1-40990f 2586->2590 2587->2586 2588->2586 2591 409922-409929 2589->2591 2590->2591 2592 4099cb-409ac2 2591->2592 2593 40992f-409988 2591->2593 2595 409b02-409b4d 2592->2595 2596 409ac4-409afd 2592->2596 2593->2592 2601 40998a-4099c6 2593->2601 2599 409b8d-409b93 2595->2599 2600 409b4f-409b88 2595->2600 2598 409e8e-409f47 2596->2598 2602 409f49-409f87 2598->2602 2603 409f8c-409f9e 2598->2603 2604 409b99-409c20 2599->2604 2600->2598 2605 40a472-40a477 ExitProcess 2601->2605 2606 40a466-40a46c 2602->2606 2607 409fa0-409fac 2603->2607 2608 409fb1-40a002 2603->2608 2609 409c24-409d14 2604->2609 2606->2605 2607->2606 2612 40a004-40a042 2608->2612 2613 40a047-40a088 2608->2613 2610 409d16-409d26 2609->2610 2611 409d2b-409d35 2609->2611 2617 409dae-409db5 2610->2617 2611->2609 2614 409d3b-409d48 2611->2614 2612->2606 2615 40a08a-40a0c8 2613->2615 2616 40a0cd-40a191 2613->2616 2614->2609 2618 409d4e-409d8a 2614->2618 2615->2606 2626 40a197-40a26e 2616->2626 2627 40a45a-40a460 2616->2627 2620 409df7-409e43 2617->2620 2621 409db7-409df2 2617->2621 2622 409d98 2618->2622 2623 409d8c-409d96 2618->2623 2624 409e55-409e87 2620->2624 2625 409e45-409e4f 2620->2625 2621->2598 2628 409da2-409da8 2622->2628 2623->2628 2624->2598 2625->2604 2625->2624 2629 40a279-40a287 2626->2629 2627->2606 2628->2617 2630 40a315-40a360 2629->2630 2631 40a28d-40a29a 2629->2631 2632 40a371-40a3c2 2630->2632 2633 40a362-40a36c 2630->2633 2631->2630 2634 40a29c-40a2e7 2631->2634 2636 40a3d0-40a402 2632->2636 2637 40a3c4-40a3ce 2632->2637 2635 40a40c-40a413 2633->2635 2638 40a307 2634->2638 2639 40a2e9-40a305 2634->2639 2641 40a455 2635->2641 2642 40a415-40a453 2635->2642 2636->2635 2637->2635 2638->2629 2639->2638 2643 40a30e 2639->2643 2641->2627 2642->2606 2643->2630
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: df21ca10aed49071c5b6b2f28568336d275df7644821752aeb7a37ebf4f4b97c
                                                        • Instruction ID: 8814cd1c3c061a6c33971eeb85ef7a85a703eda32cd3c751a69f55dd44878a16
                                                        • Opcode Fuzzy Hash: df21ca10aed49071c5b6b2f28568336d275df7644821752aeb7a37ebf4f4b97c
                                                        • Instruction Fuzzy Hash: 1801A9F49046A98FCB248B54CD88BDDBBB4BB05305F1442EAD519B7741D7345E85CF09

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2644 409429-409929 2646 4099cb-409ac2 2644->2646 2647 40992f-409988 2644->2647 2648 409b02-409b4d 2646->2648 2649 409ac4-409afd 2646->2649 2647->2646 2654 40998a-4099c6 2647->2654 2652 409b8d-409b93 2648->2652 2653 409b4f-409b88 2648->2653 2651 409e8e-409f47 2649->2651 2655 409f49-409f87 2651->2655 2656 409f8c-409f9e 2651->2656 2657 409b99-409c20 2652->2657 2653->2651 2658 40a472-40a477 ExitProcess 2654->2658 2659 40a466-40a46c 2655->2659 2660 409fa0-409fac 2656->2660 2661 409fb1-40a002 2656->2661 2662 409c24-409d14 2657->2662 2659->2658 2660->2659 2665 40a004-40a042 2661->2665 2666 40a047-40a088 2661->2666 2663 409d16-409d26 2662->2663 2664 409d2b-409d35 2662->2664 2670 409dae-409db5 2663->2670 2664->2662 2667 409d3b-409d48 2664->2667 2665->2659 2668 40a08a-40a0c8 2666->2668 2669 40a0cd-40a191 2666->2669 2667->2662 2671 409d4e-409d8a 2667->2671 2668->2659 2679 40a197-40a26e 2669->2679 2680 40a45a-40a460 2669->2680 2673 409df7-409e43 2670->2673 2674 409db7-409df2 2670->2674 2675 409d98 2671->2675 2676 409d8c-409d96 2671->2676 2677 409e55-409e87 2673->2677 2678 409e45-409e4f 2673->2678 2674->2651 2681 409da2-409da8 2675->2681 2676->2681 2677->2651 2678->2657 2678->2677 2682 40a279-40a287 2679->2682 2680->2659 2681->2670 2683 40a315-40a360 2682->2683 2684 40a28d-40a29a 2682->2684 2685 40a371-40a3c2 2683->2685 2686 40a362-40a36c 2683->2686 2684->2683 2687 40a29c-40a2e7 2684->2687 2689 40a3d0-40a402 2685->2689 2690 40a3c4-40a3ce 2685->2690 2688 40a40c-40a413 2686->2688 2691 40a307 2687->2691 2692 40a2e9-40a305 2687->2692 2694 40a455 2688->2694 2695 40a415-40a453 2688->2695 2689->2688 2690->2688 2691->2682 2692->2691 2696 40a30e 2692->2696 2694->2680 2695->2659 2696->2683
                                                        APIs
                                                        • ExitProcess.KERNEL32(DEADBEEF), ref: 0040A477
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess
                                                        • String ID:
                                                        • API String ID: 621844428-0
                                                        • Opcode ID: 65f52e8dd54f9a268cfcf699dfda5c29f93e292edebcae2cc65d72117e3ed62b
                                                        • Instruction ID: 83806e5cf736b1ee28465a3577a62dddcaab2ffde1162d51884bde53348236b6
                                                        • Opcode Fuzzy Hash: 65f52e8dd54f9a268cfcf699dfda5c29f93e292edebcae2cc65d72117e3ed62b
                                                        • Instruction Fuzzy Hash: 3FF0B2F8A042A88FCB248F14CC88BD9BB74BB04309F0445EAE11AB7381D7349E85CF09

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2982 411f70-411fcd 2983 411fd3-411fe2 OpenProcessToken 2982->2983 2984 4121c9 2982->2984 2985 411fe4-411fea GetLastError 2983->2985 2986 411fef-412009 DuplicateTokenEx 2983->2986 2987 4121cb-4121db call 413f30 2984->2987 2988 41216b-412170 2985->2988 2989 412016-41203b AllocateAndInitializeSid 2986->2989 2990 41200b-412011 GetLastError 2986->2990 2993 412172-412173 CloseHandle 2988->2993 2994 412179-41217e 2988->2994 2995 412048-41206c CreateWellKnownSid 2989->2995 2996 41203d-412043 GetLastError 2989->2996 2990->2988 2993->2994 2997 412180-412181 CloseHandle 2994->2997 2998 412187-41218c 2994->2998 2999 4120e5-412103 CreateRestrictedToken 2995->2999 3000 41206e-412077 GetLastError 2995->3000 2996->2988 2997->2998 3003 412195-412197 2998->3003 3004 41218e-41218f FreeSid 2998->3004 3005 412105-41210b GetLastError 2999->3005 3006 41210d-412132 AllocateAndInitializeSid 2999->3006 3001 412079-41207c 3000->3001 3002 41207e-412083 3000->3002 3001->2999 3001->3002 3002->2988 3007 412089-41209d GetProcessHeap HeapAlloc 3002->3007 3008 4121a9-4121ae 3003->3008 3009 412199-4121a3 GetProcessHeap HeapFree 3003->3009 3004->3003 3005->2988 3010 412134-41213a GetLastError 3006->3010 3011 41213c-41215c SetTokenInformation 3006->3011 3012 4120aa-4120c9 call 414e2c CreateWellKnownSid 3007->3012 3013 41209f-4120a5 GetLastError 3007->3013 3014 4121b0-4121b1 FreeSid 3008->3014 3015 4121b7-4121bc 3008->3015 3009->3008 3010->2988 3016 412166 3011->3016 3017 41215e-412164 GetLastError 3011->3017 3022 4120d6-4120de 3012->3022 3023 4120cb-4120d1 GetLastError 3012->3023 3013->2988 3014->3015 3015->2987 3019 4121be-4121c0 3015->3019 3016->2988 3017->2988 3019->2987 3021 4121c2-4121c3 CloseHandle 3019->3021 3021->2984 3022->2999 3023->2988
                                                        APIs
                                                        • OpenProcessToken.ADVAPI32(00000000,00000002,00000000,00000000), ref: 00411FDA
                                                        • GetLastError.KERNEL32 ref: 00411FE4
                                                        • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000002,00000002,00000000), ref: 00412001
                                                        • GetLastError.KERNEL32 ref: 0041200B
                                                        • CloseHandle.KERNEL32(00000000), ref: 00412173
                                                        • CloseHandle.KERNEL32(00000000), ref: 00412181
                                                        • FreeSid.ADVAPI32(00000000), ref: 0041218F
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041219C
                                                        • HeapFree.KERNEL32(00000000), ref: 004121A3
                                                        • FreeSid.ADVAPI32(?), ref: 004121B1
                                                        • CloseHandle.KERNEL32(00000000), ref: 004121C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CloseFreeHandle$ErrorHeapLastProcessToken$DuplicateOpen
                                                        • String ID:
                                                        • API String ID: 1790262672-3916222277
                                                        • Opcode ID: 3f1a59d8f73edaad4b434cf73b553cf54cd56f2ab1023acbd563036531d9d7d6
                                                        • Instruction ID: a903014ab0d868ded00178ac02ce73e7f8232d77ebbf52772378c1a350528e59
                                                        • Opcode Fuzzy Hash: 3f1a59d8f73edaad4b434cf73b553cf54cd56f2ab1023acbd563036531d9d7d6
                                                        • Instruction Fuzzy Hash: 1761D170A40208BBEB14DFA1DD59BEE7B78AB08B01F144125FA01F6290D7B89E558B69
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,00429070,000007CF,00000000,00000000), ref: 0040D852
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,0042A010,0000001A,00000000,00429070,0042906E,00429070,0042906E), ref: 0040D946
                                                        • GetProcessHeap.KERNEL32(00000000,00000004), ref: 0040D9CD
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0040D9D4
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000024,00000000), ref: 0040DA19
                                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 0040DA38
                                                        • GetProcessHeap.KERNEL32(00000000,00000026), ref: 0040DA7C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0040DA83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Heap$AllocFolderPathProcessSpecial$DirectoryFileModuleNameWindows
                                                        • String ID: $$\
                                                        • API String ID: 2560937269-1395706711
                                                        • Opcode ID: c2cb07e2c611a4aaa378541a72539b26cc0aaaf703b57eb2e97274b412ec1d77
                                                        • Instruction ID: 06cb1b4999db3c3cde009c85b0b3182518ded17d7e086e67de86218526070a2f
                                                        • Opcode Fuzzy Hash: c2cb07e2c611a4aaa378541a72539b26cc0aaaf703b57eb2e97274b412ec1d77
                                                        • Instruction Fuzzy Hash: FE713371B002049BDB20AFA8DD45BAA7365EB48704F8445BBE906EB2D0D77C9E49CB4D
                                                        APIs
                                                        • CoInitializeEx.OLE32(00000000,00000000,00000000,?), ref: 00411A8F
                                                        • CoUninitialize.OLE32 ref: 00411ACF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: InitializeUninitialize
                                                        • String ID: ROOT\CIMV2
                                                        • API String ID: 3442037557-2786109267
                                                        • Opcode ID: 7154ad24f0ce045c8ebfdc6c4ce43aeb2f04787b459809e6e5fcd4b27f8df5be
                                                        • Instruction ID: 6ab19ea00e4a884013ecfa3ee51ab5763124654a81a6a4930a193ff57cc8d813
                                                        • Opcode Fuzzy Hash: 7154ad24f0ce045c8ebfdc6c4ce43aeb2f04787b459809e6e5fcd4b27f8df5be
                                                        • Instruction Fuzzy Hash: E451C671B41205ABEB21DF64CC55F9ABBB4EF04744F10415AE909AB3D0DB79AD80CB98
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(?,?,?,?,?,?), ref: 0040F17E
                                                        • GetMappedFileNameW.PSAPI(00000000,?,?,?), ref: 0040F185
                                                        • GetLogicalDriveStringsW.KERNEL32(00000103,?,?,?,?,?,?,?), ref: 0040F1DA
                                                        • QueryDosDeviceW.KERNEL32(00000FA0,?,00000103,?,?,?,?,?,?), ref: 0040F214
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CurrentDeviceDriveFileLogicalMappedNameProcessQueryStrings
                                                        • String ID:
                                                        • API String ID: 1028133890-0
                                                        • Opcode ID: 8032052f7ecf8c49a705a95394094d809a3f8ada2613e8f619425ca6245f0eb5
                                                        • Instruction ID: 48b8bba606bf70ced818c55d0dde4bd3379a05982e34b3b01aafbcf70260f82a
                                                        • Opcode Fuzzy Hash: 8032052f7ecf8c49a705a95394094d809a3f8ada2613e8f619425ca6245f0eb5
                                                        • Instruction Fuzzy Hash: 9B51D479A002099BDB249F64DC557EA73B8FF44704F4440BEEC0AE7681EB359E45CB68
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000001C,00000000), ref: 004113F6
                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0041142F
                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00411478
                                                        • CloseHandle.KERNEL32(00000000), ref: 00411483
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: e5b8cd542245b9e5d170e6a0bb264918fa009bff68f2b0f059f730a2013b970c
                                                        • Instruction ID: ed6ce81f11c814b95676c3b144244a8704dff2a5250c1b87c862d7b63bcea838
                                                        • Opcode Fuzzy Hash: e5b8cd542245b9e5d170e6a0bb264918fa009bff68f2b0f059f730a2013b970c
                                                        • Instruction Fuzzy Hash: 0721B735601219ABCB20DF75DC98FEE73B8AF48704F0441AAF90997290DB389E85CA59
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00414A3E
                                                        • IsDebuggerPresent.KERNEL32 ref: 00414B0A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00414B2A
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00414B34
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: eb54633653b1e7136daff6d8c49d900db8813ee08b08b0927fb5eae355787c96
                                                        • Instruction ID: e027bf533add66c97cff3441150d370cccecafee1f68af7ea3ec92b8e2f9eeb7
                                                        • Opcode Fuzzy Hash: eb54633653b1e7136daff6d8c49d900db8813ee08b08b0927fb5eae355787c96
                                                        • Instruction Fuzzy Hash: A3311A75D4521CDBDB10DFA4D949BCDBBB8BF08704F1041AAE50DA7250EB749A848F49
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,?,00000000,00000000), ref: 0040DCB6
                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DC12,?), ref: 0040DCBD
                                                          • Part of subcall function 00412BD0: GetCurrentProcess.KERNEL32(?,?), ref: 00412C87
                                                          • Part of subcall function 00412BD0: IsWow64Process.KERNEL32(00000000), ref: 00412C8E
                                                          • Part of subcall function 00412BD0: RegGetValueW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,20010002,00000000,?,00000800), ref: 00412CED
                                                          • Part of subcall function 00412A50: SHGetKnownFolderPath.SHELL32(00419BA0,00000000,00000000,?), ref: 00412B08
                                                          • Part of subcall function 00412A50: CoTaskMemFree.OLE32(?), ref: 00412B43
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 0040DEE1
                                                        • HeapFree.KERNEL32(00000000), ref: 0040DEE8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: HeapProcess$Free$AllocCurrentFolderKnownPathTaskValueWow64
                                                        • String ID:
                                                        • API String ID: 296583963-0
                                                        • Opcode ID: 72626ed7ebf942f3da3b4ff624644a62b2db256d44a538c0bd3af436bd098ac9
                                                        • Instruction ID: 00c302652f448dc867151c1637c7350e428b9fb300c2f3923f77f2eb57857071
                                                        • Opcode Fuzzy Hash: 72626ed7ebf942f3da3b4ff624644a62b2db256d44a538c0bd3af436bd098ac9
                                                        • Instruction Fuzzy Hash: 86C1A071E002169BCF14DFA5D984BEEB7B5AF94304F04813AE812B73D1DB389958CB99
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00414867
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor
                                                        • String ID:
                                                        • API String ID: 2325560087-0
                                                        • Opcode ID: 85a69eae14f70fac69dded71679b64cec421971be0a92efe753145918f18106b
                                                        • Instruction ID: 1fa32a7a9fe8101fc44ca39a3572bb05595d9e056a4a196d7830266f7ff49f08
                                                        • Opcode Fuzzy Hash: 85a69eae14f70fac69dded71679b64cec421971be0a92efe753145918f18106b
                                                        • Instruction Fuzzy Hash: 4A5128B1E102198FDB28CF65E9856ABBBF4FB88350F54847AD406EB350D378A941CB58
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00414BC0,004144D5), ref: 00414BAB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 440e09a70d4185e5134bd87ad335f7482d09bb33f6763d4479a60e5079aa7941
                                                        • Instruction ID: 190a85c4e36117c4851cde842c683295131adae64d9cec044f87a4c0bc670d8d
                                                        • Opcode Fuzzy Hash: 440e09a70d4185e5134bd87ad335f7482d09bb33f6763d4479a60e5079aa7941
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 68eadc18075bdc65311dabbbd5e33a507b9c8c5ec6331530920b369572d2fcb4
                                                        • Instruction ID: 856b991f6e70e0fb9ef2f4d066a2f33dcaea3df2205236e27f0407f8aebd5464
                                                        • Opcode Fuzzy Hash: 68eadc18075bdc65311dabbbd5e33a507b9c8c5ec6331530920b369572d2fcb4
                                                        • Instruction Fuzzy Hash: 0E52FE31E00249CECB2CDEBDC6E96DDFFB5AB84350F10E25B9089A7598C7315A469F60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d7c172fee57f1ed6548c406c90953512d452ac45c9f20a0457aeeb3b1aa6324
                                                        • Instruction ID: 82ae146b6ef45b9bf12d15841689aaa0a6ce40555f9a682480e8bc04d299ba44
                                                        • Opcode Fuzzy Hash: 3d7c172fee57f1ed6548c406c90953512d452ac45c9f20a0457aeeb3b1aa6324
                                                        • Instruction Fuzzy Hash: 7A71D231A01219CEDB2CDF78C7E9ADDFF75AB94210F10E19B9089A7598C7316F429E60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 54bafcd4f452923c6dd5c3b503312fcff292afa5b617bf38974f011cb8c44b16
                                                        • Instruction ID: b7484dc350ae4b698d06df24e6f54f8242ce954ef6036649c6e2d9891a72fd00
                                                        • Opcode Fuzzy Hash: 54bafcd4f452923c6dd5c3b503312fcff292afa5b617bf38974f011cb8c44b16
                                                        • Instruction Fuzzy Hash: 6A710A32E00209CECB2CDEB9C6E99DDFF76BB94600F10E25F9095A7598C7356A429E50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2882 40d0b0-40d142 SetDllDirectoryW call 40eca0 call 414e2c VerSetConditionMask * 4 VerifyVersionInfoW 2887 40d144-40d14f GetLastError 2882->2887 2888 40d155-40d1b3 VerSetConditionMask * 2 VerifyVersionInfoW 2882->2888 2887->2888 2889 40d4dd-40d4f5 call 413f30 2887->2889 2888->2889 2890 40d1b9-40d20f call 412bd0 call 412a50 call 40d500 * 2 LoadLibraryExW GetCurrentProcess OpenProcessToken 2888->2890 2901 40d211-40d233 GetTokenInformation 2890->2901 2902 40d238-40d23e 2890->2902 2901->2902 2903 40d240-40d241 CloseHandle 2902->2903 2904 40d247-40d26f RegOpenKeyExW 2902->2904 2903->2904 2905 40d2e0 2904->2905 2906 40d271-40d2b4 RegGetValueW RegCloseKey 2904->2906 2908 40d2ea-40d2f0 2905->2908 2906->2905 2907 40d2b6-40d2bb 2906->2907 2909 40d2d4-40d2de 2907->2909 2910 40d2bd-40d2c2 2907->2910 2911 40d2f6-40d31d call 414e2c SHGetSpecialFolderPathA 2908->2911 2912 40d45a-40d470 call 40d830 call 40cc90 call 40db10 2908->2912 2909->2908 2910->2909 2914 40d2c4-40d2d2 2910->2914 2911->2912 2918 40d323-40d346 2911->2918 2926 40d472-40d481 GetModuleHandleW 2912->2926 2927 40d4c5-40d4da call 413f30 2912->2927 2914->2908 2923 40d348-40d354 2918->2923 2924 40d35b-40d3b9 CreateDirectoryA CreateFileA 2918->2924 2923->2924 2936 40d3bb-40d3c2 CloseHandle 2924->2936 2937 40d3cc-40d3f1 CreateFileA 2924->2937 2929 40d4c0 2926->2929 2930 40d483-40d49f GetProcAddress * 2 2926->2930 2929->2927 2930->2929 2933 40d4a1-40d4a3 2930->2933 2933->2929 2935 40d4a5-40d4be 2933->2935 2935->2929 2936->2937 2937->2912 2938 40d3f3-40d422 CreateSemaphoreW CreateEventW 2937->2938 2938->2912 2940 40d424-40d426 2938->2940 2940->2912 2941 40d428-40d447 CreateThread 2940->2941 2941->2912 2942 40d449-40d454 ResumeThread 2941->2942 2942->2912
                                                        APIs
                                                        • SetDllDirectoryW.KERNEL32(00419D44), ref: 0040D0D1
                                                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003), ref: 0040D107
                                                        • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000003), ref: 0040D113
                                                        • VerSetConditionMask.KERNEL32(00000000,?,00000020,00000003,?,00000001,00000003), ref: 0040D11F
                                                        • VerSetConditionMask.KERNEL32(00000000,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D12B
                                                        • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 0040D13A
                                                        • GetLastError.KERNEL32(?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D144
                                                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D190
                                                        • VerSetConditionMask.KERNEL32(00000000,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D19C
                                                        • VerifyVersionInfoW.KERNEL32(?,00000003,00000000), ref: 0040D1AB
                                                        • LoadLibraryExW.KERNEL32(cryptnet.dll,00000000,00000800,SOFTWARE\Microsoft\Cryptography\Defaults\Provider,Image Path,SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv,Dll,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D1ED
                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D200
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D207
                                                        • GetTokenInformation.ADVAPI32(0000011C,00000014(TokenIntegrityLevel),?,00000004,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003), ref: 0040D22B
                                                        • CloseHandle.KERNEL32(?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D241
                                                        • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Policies\Zoom\Zoom Meetings\General,00000000,00020019,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003), ref: 0040D267
                                                        • RegGetValueW.ADVAPI32(?,00000000,Disable3rdModuleVerify,0000FFFF,00000006,?,?,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D2A0
                                                        • RegCloseKey.ADVAPI32(?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D2AC
                                                        • SHGetSpecialFolderPathA.SHELL32(00000000,?,0000001C,00000000,?,?,?,00000118), ref: 0040D315
                                                        • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D376
                                                        • CreateFileA.KERNEL32(?,10000000,00000003,00000000,00000002,00000080,00000000), ref: 0040D3AB
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D3BC
                                                        • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 0040D3E3
                                                        • CreateSemaphoreW.KERNEL32(00000000,00000000,7FFFFFFF,00000000), ref: 0040D3FE
                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040D411
                                                        • CreateThread.KERNEL32(00000000,00000000,0040EA50,00429068,00000004,00000000), ref: 0040D43A
                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0040D454
                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D477
                                                        • GetProcAddress.KERNEL32(00000000,LdrRegisterDllNotification), ref: 0040D489
                                                        • GetProcAddress.KERNEL32(00000000,LdrUnregisterDllNotification), ref: 0040D497
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ConditionCreateMask$CloseHandle$AddressDirectoryFileInfoOpenProcProcessThreadTokenVerifyVersion$CurrentErrorEventFolderInformationLastLibraryLoadModulePathResumeSemaphoreSpecialValue
                                                        • String ID: Disable3rdModuleVerify$Dll$Image Path$LdrRegisterDllNotification$LdrUnregisterDllNotification$SOFTWARE\Microsoft\Cryptography\Defaults\Provider$SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv$SOFTWARE\Policies\Zoom\Zoom Meetings\General$ZoomVDI$\appsafecheck.txt$cryptnet.dll$ntdll.dll
                                                        • API String ID: 695945955-2430632280
                                                        • Opcode ID: e1f959e6f971e7319ddb763f41403bf31d78c8abb299f65c2b581fd2ccc26623
                                                        • Instruction ID: e3f8eedf6af3ffbc4967407a62473a63f14479d3ec8d4df312e392e0d987a7e2
                                                        • Opcode Fuzzy Hash: e1f959e6f971e7319ddb763f41403bf31d78c8abb299f65c2b581fd2ccc26623
                                                        • Instruction Fuzzy Hash: F1B1B370B40301BBE7209F60DC4AF9B77A8EB44B05F40893AF655E61E0D7B89909CB5E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2943 412270-4122a2 SHGetSpecialFolderPathW 2944 412332-412348 SHGetSpecialFolderPathW 2943->2944 2945 4122a8-4122de 2943->2945 2946 41234a-41237d PathAppendW * 2 GetCurrentProcessId 2944->2946 2947 41239c-4123b2 call 413f30 2944->2947 2945->2944 2957 4122e0-412311 GetPrivateProfileStringW 2945->2957 2946->2947 2948 41237f-412394 OpenProcess 2946->2948 2951 4123b3-4123be call 411f70 2948->2951 2952 412396 GetLastError 2948->2952 2958 4123c0-4123cb ImpersonateLoggedOnUser 2951->2958 2959 4123d3-4123df CloseHandle 2951->2959 2952->2947 2957->2944 2960 412313-412330 2957->2960 2958->2959 2961 4123cd GetLastError 2958->2961 2959->2947 2962 4123e1-412427 CreateDirectoryW call 414e2c GetTempFileNameW 2959->2962 2960->2944 2960->2947 2961->2959 2966 412429-412437 DeleteFileW 2962->2966 2967 41243c-412444 RevertToSelf 2962->2967 2966->2967 2968 412446-412447 CloseHandle 2967->2968 2969 41244d-412452 2967->2969 2968->2969 2969->2947 2970 412458-412577 call 414e2c * 2 VerSetConditionMask * 3 VerifyVersionInfoW 2969->2970 2976 4125a1-4125b6 call 413f30 2970->2976 2977 412579-412586 GetModuleHandleW 2970->2977 2977->2976 2979 412588-412596 GetProcAddress 2977->2979 2979->2976 2981 412598-41259a 2979->2981 2981->2976
                                                        APIs
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000), ref: 0041229A
                                                        • GetPrivateProfileStringW.KERNEL32(ZoomChat,com.zoom.test.disable_crash_handler,00000000,?,00000008,?), ref: 00412309
                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000000), ref: 00412340
                                                        • PathAppendW.SHLWAPI(?,ZoomVDI), ref: 00412357
                                                        • PathAppendW.SHLWAPI(?,logs), ref: 0041236A
                                                        • GetCurrentProcessId.KERNEL32 ref: 00412375
                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00412388
                                                        • GetLastError.KERNEL32 ref: 00412396
                                                        • ImpersonateLoggedOnUser.ADVAPI32(00000000), ref: 004123C1
                                                        • GetLastError.KERNEL32 ref: 004123CD
                                                        • CloseHandle.KERNEL32(?), ref: 004123D7
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 004123EB
                                                        • GetTempFileNameW.KERNEL32(?,zoomtest,00000000,?), ref: 0041241F
                                                        • DeleteFileW.KERNEL32(?), ref: 00412431
                                                        • RevertToSelf.ADVAPI32 ref: 0041243C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00412447
                                                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003), ref: 004124F5
                                                        • VerSetConditionMask.KERNEL32(00000000), ref: 004124FD
                                                        • VerSetConditionMask.KERNEL32(00000000), ref: 00412505
                                                        • VerifyVersionInfoW.KERNEL32(?), ref: 0041253A
                                                        • GetModuleHandleW.KERNEL32(zCrashReport.dll), ref: 0041257E
                                                        • GetProcAddress.KERNEL32(00000000,crSetZoomHome), ref: 0041258E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Path$ConditionHandleMask$AppendCloseErrorFileFolderLastProcessSpecial$AddressCreateCurrentDeleteDirectoryImpersonateInfoLoggedModuleNameOpenPrivateProcProfileRevertSelfStringTempUserVerifyVersion
                                                        • String ID: ZoomChat$ZoomVDI$\Zoom\data\Zoom.us.ini$com.zoom.test.disable_crash_handler$crSetZoomHome$logs$yes$zCrashReport.dll$zoomtest
                                                        • API String ID: 1294346636-1563055977
                                                        • Opcode ID: 6d4db1bb0bed33e30413c97dc72b642164295202b736abbae61969f2f0ffef42
                                                        • Instruction ID: 12433930e13e6caf05908e59b317de0784475af6ab8e2ec7126003c472830eac
                                                        • Opcode Fuzzy Hash: 6d4db1bb0bed33e30413c97dc72b642164295202b736abbae61969f2f0ffef42
                                                        • Instruction Fuzzy Hash: FA81A271645344ABE720DFA0ED09FDB77ECAF84B01F40492AF948D61D0DBB89948CB5A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3024 4125c0-4125da WTHelperProvDataFromStateData 3025 4125e0-4125e8 3024->3025 3026 4126f8-412700 3024->3026 3025->3026 3027 4125ee 3025->3027 3028 4125f0-412602 WTHelperGetProvSignerFromChain 3027->3028 3028->3026 3029 412608-412610 3028->3029 3030 412616-412620 WTHelperGetProvCertFromChain 3029->3030 3031 4126e8-4126f2 3029->3031 3032 4126e5 3030->3032 3033 412626-41262b 3030->3033 3031->3026 3031->3028 3032->3031 3034 412631-412648 CertGetNameStringW 3033->3034 3035 41262d-41262f 3033->3035 3037 41264a-41264c 3034->3037 3038 41264e-412665 GetProcessHeap HeapAlloc 3034->3038 3036 4126a4-4126b6 3035->3036 3041 4126c5-4126df GetProcessHeap HeapFree 3036->3041 3042 4126b8-4126c3 call 413a80 3036->3042 3037->3036 3039 412667-412669 3038->3039 3040 41269f 3038->3040 3043 412670-412677 3039->3043 3044 4126a1 3040->3044 3041->3030 3041->3032 3042->3041 3049 412701-41271c GetProcessHeap HeapFree 3042->3049 3043->3043 3046 412679-41268d CertGetNameStringW 3043->3046 3044->3036 3046->3044 3048 41268f-412699 GetProcessHeap HeapFree 3046->3048 3048->3040
                                                        APIs
                                                        • WTHelperProvDataFromStateData.WINTRUST(?,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 004125CF
                                                        • WTHelperGetProvSignerFromChain.WINTRUST(00000000,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 004125F7
                                                        • WTHelperGetProvCertFromChain.WINTRUST(00000000,00000000,?,?,?,?,?,00412868), ref: 00412618
                                                        • CertGetNameStringW.CRYPT32(?,00000004,00000000,00000000,00000000,00000000,?,?,?,?,?,00412868), ref: 0041263C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,00412868), ref: 004126C8
                                                        • HeapFree.KERNEL32(00000000,?,?,?,?,?,00412868), ref: 004126CF
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,00412868), ref: 00412704
                                                        • HeapFree.KERNEL32(00000000,?,?,?,?,?,00412868), ref: 0041270B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Heap$FromHelperProv$CertChainDataFreeProcess$NameSignerStateString
                                                        • String ID: Zoom Video Communications, Inc.$h(A
                                                        • API String ID: 1193424130-546350467
                                                        • Opcode ID: f5d44680248929655a779e8b52e6a80615bd4f95dfae2ca292d3e3ad0e7b2e22
                                                        • Instruction ID: b50a9664b00a001a61916bde13f5431a76f3f421a5cc4ad1fd8f560c47aafd93
                                                        • Opcode Fuzzy Hash: f5d44680248929655a779e8b52e6a80615bd4f95dfae2ca292d3e3ad0e7b2e22
                                                        • Instruction Fuzzy Hash: 2241C330A40310BFDB209FA59D88BDFBB78FF48711F1044AAE905E72D0C6B499908A6C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3050 402820-402863 call 414fba 3054 4028e1-4028e8 3050->3054 3055 402865-40289a 3050->3055 3056 4028f9-402900 3054->3056 3057 4028ea-4028f0 3054->3057 3061 4028a0 call 408170 3055->3061 3059 402902-40290b 3056->3059 3060 40296c-4029ea call 402e6c 3056->3060 3057->3056 3067 402952-402955 3059->3067 3068 40290d-40293d 3059->3068 3093 4029f0-402a87 3060->3093 3094 402ce5-402cee 3060->3094 3063 4028a5-4028b4 call 401b8f 3061->3063 3073 4028b5 call 408170 3063->3073 3071 402e64-402e69 call 414f78 3067->3071 3072 40295b-402967 3067->3072 3079 402943 call 408170 3068->3079 3072->3071 3077 4028ba-4028c4 3073->3077 3085 4028c5 call 408170 3077->3085 3081 402948-40294a 3079->3081 3084 40294b call 408170 3081->3084 3086 402950-402951 3084->3086 3087 4028ca-4028d9 call 401b8f 3085->3087 3086->3067 3092 4028da call 408170 3087->3092 3095 4028df-4028e0 3092->3095 3137 402a8a call 4070fd 3093->3137 3098 402cf0-402cf3 3094->3098 3099 402d64-402d66 3094->3099 3095->3054 3103 402cf9 call 408345 3098->3103 3101 402d68-402d6e 3099->3101 3102 402d7a-402d84 3099->3102 3101->3102 3105 402d95-402d9b 3102->3105 3106 402d86-402d89 3102->3106 3104 402cfe-402d40 3103->3104 3113 402d46 call 408170 3104->3113 3107 402da1-402dc9 call 4098ca 3105->3107 3108 402e44-402e5f call 401e49 3105->3108 3110 402d8f 3106->3110 3123 402e34-402e36 3107->3123 3124 402dcb-402e02 3107->3124 3108->3071 3110->3105 3117 402d4b-402d56 call 401b8f 3113->3117 3127 402d57 call 408170 3117->3127 3123->3108 3126 402e38 3123->3126 3131 402e08 call 408170 3124->3131 3126->3108 3129 402d5c-402d63 3127->3129 3129->3099 3133 402e0d-402e1c call 401b8f 3131->3133 3139 402e1d call 408170 3133->3139 3138 402a8f-402a9e 3137->3138 3143 402aa4-402aa7 3138->3143 3144 402b6a-402b6d 3138->3144 3140 402e22-402e2c 3139->3140 3145 402e2d call 408170 3140->3145 3146 402aad call 408345 3143->3146 3147 402b7e-402b81 3144->3147 3148 402b6f-402b75 3144->3148 3149 402e32-402e33 3145->3149 3150 402ab2-402ac4 3146->3150 3151 402b92-402b9c 3147->3151 3152 402b83-402b89 3147->3152 3148->3147 3149->3123 3153 402aca call 408345 3150->3153 3154 402bad-402bb6 3151->3154 3155 402b9e-402ba4 3151->3155 3152->3151 3156 402acf-402b1f 3153->3156 3158 402bb8 call 401c30 3154->3158 3155->3154 3161 402b25 call 408170 3156->3161 3160 402bbd-402be8 3158->3160 3162 402be9 call 4097d3 3160->3162 3163 402b2a-402b34 3161->3163 3164 402bee-402bf7 3162->3164 3167 402b35 call 408170 3163->3167 3168 402c94-402c9e 3164->3168 3169 402bfd-402c40 3164->3169 3170 402b3a-402b45 call 401b8f 3167->3170 3171 402ca0-402ca6 3168->3171 3172 402caf-402ce0 3168->3172 3178 402c46 call 408170 3169->3178 3176 402b46 call 408170 3170->3176 3171->3172 3172->3110 3179 402b4b-402b56 call 401b8f 3176->3179 3180 402c4b-402c5a call 401b8f 3178->3180 3187 402b57 call 408170 3179->3187 3186 402c5b call 408170 3180->3186 3189 402c60-402c6a 3186->3189 3190 402b5c-402b69 3187->3190 3193 402c6b call 408170 3189->3193 3190->3144 3194 402c70-402c7a 3193->3194 3196 402c7b call 408170 3194->3196 3197 402c80-402c8c call 401b8f 3196->3197 3200 402c8d call 408170 3197->3200 3201 402c92-402c93 3200->3201 3201->3168
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040282A
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                          • Part of subcall function 00402E6C: __EH_prolog3.LIBCMT ref: 00402E73
                                                        Strings
                                                        • , strPageImgName:, xrefs: 00402888
                                                        • , strEncryptedFilePath:, xrefs: 00402B01, 00402C1A
                                                        • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] fn.IsExists is false! strImageFilePath:, xrefs: 00402D34
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 0040286C, 00402914, 00402AE8, 00402C04, 00402D14, 00402DD2
                                                        • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] EncryptImgFile bEncrypt:, xrefs: 00402B19
                                                        • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] m_ipcSender is NULL!, xrefs: 00402934
                                                        • , m_nPPTSliderShowNum:, xrefs: 00402C35
                                                        • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertProgressMessage strTaskID:, xrefs: 00402C3A
                                                        • , strImageFilePath:, xrefs: 00402B06
                                                        • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] strTaskID:, xrefs: 00402893
                                                        • , m_nVbsSucessNum:, xrefs: 00402DF7
                                                        • , uPageIndexFinished:, xrefs: 0040288E, 00402C20
                                                        • [CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertFinishMessage strTaskID:, xrefs: 00402DFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$H_prolog3ProtectVirtual
                                                        • String ID: , m_nPPTSliderShowNum:$, m_nVbsSucessNum:$, strEncryptedFilePath:$, strImageFilePath:$, strPageImgName:$, uPageIndexFinished:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] EncryptImgFile bEncrypt:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertFinishMessage strTaskID:$[CDocConvert::HandleIPC_VBSIPCConvertProgressMessage] SendImgConvertProgressMessage strTaskID:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] fn.IsExists is false! strImageFilePath:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] m_ipcSender is NULL!$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCConvertProgressMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 2383558652-3366109944
                                                        • Opcode ID: bd2a8017478969f8550b368d860d8566346eaa83fdf1b42b377f117a52fa0dba
                                                        • Instruction ID: 7ac1cac9bd74252e321e61f593a8f3a43cd74f212c4c8407b1e11f1666e8ce68
                                                        • Opcode Fuzzy Hash: bd2a8017478969f8550b368d860d8566346eaa83fdf1b42b377f117a52fa0dba
                                                        • Instruction Fuzzy Hash: 96F15C31944308ABDB14DB64DD5ABDD7BB4AF08314F1085AEE44AB71E1DF786E84CB18

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3202 40385c-403880 call 414fba 3206 403882-4038ac 3202->3206 3207 4038be-4038c5 3202->3207 3213 4038af call 408170 3206->3213 3208 4038c7-4038d0 3207->3208 3209 4038d9-4038dc 3207->3209 3208->3209 3210 40394c-403958 CoInitialize 3209->3210 3211 4038de-4038e7 3209->3211 3214 403a00-403a09 3210->3214 3215 40395e-403967 3210->3215 3220 403930 3211->3220 3221 4038e9-40391c 3211->3221 3216 4038b4-4038b6 3213->3216 3223 403a52 3214->3223 3224 403a0b-403a3e 3214->3224 3227 4039d9 3215->3227 3228 403969-4039af GetLastError 3215->3228 3218 4038b7 call 408170 3216->3218 3225 4038bc-4038bd 3218->3225 3226 403933-403936 3220->3226 3241 40391f call 408170 3221->3241 3231 403a55-403a5c 3223->3231 3242 403a41 call 408170 3224->3242 3225->3207 3229 403944-403947 3226->3229 3230 403938 3226->3230 3232 4039dc-4039e3 3227->3232 3245 4039b0 call 408170 3228->3245 3235 403c81-403c86 call 414f78 3229->3235 3230->3229 3236 403a70-403a7b 3231->3236 3237 403a5e-403a67 3231->3237 3238 403c10-403c1f 3232->3238 3239 4039e9-4039fb 3232->3239 3244 403a7c call 406ae2 3236->3244 3237->3236 3256 403c21-403c55 3238->3256 3257 403c6f-403c71 3238->3257 3239->3238 3246 403924-403926 3241->3246 3248 403a46-403a48 3242->3248 3252 403a81-403a93 3244->3252 3253 4039b5-4039bf 3245->3253 3247 403927 call 408170 3246->3247 3254 40392c-40392e 3247->3254 3255 403a49 call 408170 3248->3255 3258 403a95 call 407c9a 3252->3258 3265 4039c0 call 408170 3253->3265 3254->3226 3260 403a4e-403a50 3255->3260 3269 403c58 call 408170 3256->3269 3261 403c73 3257->3261 3262 403c7f 3257->3262 3263 403a9a-403ab2 call 406de3 3258->3263 3260->3231 3261->3262 3262->3235 3273 403af3-403af9 3263->3273 3274 403ab4-403ae1 3263->3274 3268 4039c5-4039cf 3265->3268 3275 4039d0 call 408170 3268->3275 3270 403c5d-403c67 3269->3270 3280 403c68 call 408170 3270->3280 3278 403afb-403b04 3273->3278 3279 403b0d-403b11 3273->3279 3286 403ae4 call 408170 3274->3286 3277 4039d5-4039d7 3275->3277 3277->3232 3278->3279 3283 403b13-403b18 3279->3283 3284 403b7b-403b83 3279->3284 3282 403c6d-403c6e 3280->3282 3282->3257 3283->3284 3285 403b1a-403b26 3283->3285 3291 403b85-403bc4 GetLastError 3284->3291 3292 403bec-403bef 3284->3292 3293 403b67-403b6a 3285->3293 3294 403b28-403b55 3285->3294 3287 403ae9-403aeb 3286->3287 3290 403aec call 408170 3287->3290 3295 403af1-403af2 3290->3295 3301 403bc5 call 408170 3291->3301 3296 403bf1-403bf4 3292->3296 3297 403c03-403c07 3292->3297 3293->3297 3299 403b70-403b79 3293->3299 3304 403b58 call 408170 3294->3304 3295->3273 3300 403bfa 3296->3300 3297->3238 3299->3300 3300->3297 3303 403bca-403bd4 3301->3303 3308 403bd5 call 408170 3303->3308 3305 403b5d-403b5f 3304->3305 3307 403b60 call 408170 3305->3307 3309 403b65-403b66 3307->3309 3310 403bda-403be4 3308->3310 3309->3293 3312 403be5 call 408170 3310->3312 3313 403bea-403beb 3312->3313 3313->3292
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 0040394D
                                                        • GetLastError.KERNEL32(00419E1C), ref: 00403998
                                                        • __EH_prolog3_GS.LIBCMT ref: 00403866
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • GetLastError:, xrefs: 0040399F, 00403BB4
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403889, 004038F0, 00403970, 00403A12, 00403ABB, 00403B2F, 00403B8B, 00403C28
                                                        • [CDocConvert::InitPPTApp], xrefs: 004038A5
                                                        • [CDocConvert::InitPPTApp] bRet: , xrefs: 00403C49
                                                        • [CDocConvert::::InitPPTApp] m_appPPT.CreateInstance Begin!, xrefs: 00403A35
                                                        • [CDocConvert::InitPPTApp] m_appPPT.CreateInstance failed! hr:, xrefs: 00403BBF
                                                        • [CDocConvert::InitPPTApp] Success, xrefs: 00403B4C
                                                        • [CDocConvert::InitPPTApp] already init success, don't need init twice!, xrefs: 00403913
                                                        • [CDocConvert::InitPPTApp] CoInitialize failed! hr:, xrefs: 004039AA
                                                        • [CDocConvert::::InitPPTApp] m_appPPT.CreateInstance End!, xrefs: 00403AD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ErrorH_prolog3_InitializeLastProtectVirtual
                                                        • String ID: GetLastError:$[CDocConvert::::InitPPTApp] m_appPPT.CreateInstance Begin!$[CDocConvert::::InitPPTApp] m_appPPT.CreateInstance End!$[CDocConvert::InitPPTApp]$[CDocConvert::InitPPTApp] CoInitialize failed! hr:$[CDocConvert::InitPPTApp] Success$[CDocConvert::InitPPTApp] already init success, don't need init twice!$[CDocConvert::InitPPTApp] bRet: $[CDocConvert::InitPPTApp] m_appPPT.CreateInstance failed! hr:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 81410529-2550331507
                                                        • Opcode ID: a1d979d50b407f588d9ae7c930a741d1c243bb16bd1f797c0998d9925e67fd5d
                                                        • Instruction ID: 57b23c03f83f004b13c8609271ebef5c86295075e4918dc55f590b15d17cc4e0
                                                        • Opcode Fuzzy Hash: a1d979d50b407f588d9ae7c930a741d1c243bb16bd1f797c0998d9925e67fd5d
                                                        • Instruction Fuzzy Hash: 09B17F71A40304AFDB049FA4EC9ABDD7B74EB08721F20856EF552B61E1DB785E81CA1C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3314 40e290-40e2ce 3315 40e2d4-40e2d8 3314->3315 3316 40e619 3314->3316 3315->3316 3317 40e2de-40e2e0 3315->3317 3318 40e61e-40e639 call 413f30 3316->3318 3317->3316 3319 40e2e6-40e303 call 40fa40 3317->3319 3324 40e305-40e307 3319->3324 3325 40e356-40e363 3319->3325 3324->3325 3328 40e309-40e311 3324->3328 3326 40e365 3325->3326 3327 40e36b-40e3cf call 410b10 call 410270 * 4 3325->3327 3326->3327 3348 40e3d0-40e3d9 3327->3348 3328->3325 3330 40e313-40e31a 3328->3330 3332 40e321-40e328 3330->3332 3334 40e330-40e338 3332->3334 3335 40e32a-40e32e 3332->3335 3337 40e33a-40e33f 3334->3337 3338 40e343-40e347 3334->3338 3335->3334 3335->3337 3337->3332 3340 40e341 3337->3340 3338->3325 3341 40e349-40e34e 3338->3341 3340->3325 3341->3325 3343 40e350-40e353 3341->3343 3343->3325 3348->3348 3349 40e3db-40e441 call 40fef0 * 2 EnterCriticalSection 3348->3349 3354 40e443-40e45b call 40fc90 3349->3354 3355 40e45d-40e468 call 4105e0 3349->3355 3359 40e46d-40e47e LeaveCriticalSection 3354->3359 3355->3359 3360 40e480-40e492 3359->3360 3361 40e4ae-40e4b8 3359->3361 3362 40e4a4-40e4ab call 4141bf 3360->3362 3363 40e494-40e4a2 3360->3363 3364 40e4ba-40e4cc 3361->3364 3365 40e4ee-40e4f2 3361->3365 3362->3361 3363->3362 3368 40e4de 3363->3368 3370 40e4e4-40e4eb call 4141bf 3364->3370 3371 40e4ce-40e4dc 3364->3371 3366 40e4f4-40e507 call 40e060 call 40e700 3365->3366 3367 40e50c-40e514 GetProcessWindowStation 3365->3367 3379 40e5c9 3366->3379 3374 40e5ba-40e5c3 GetCurrentProcess TerminateProcess 3367->3374 3375 40e51a-40e53c GetUserObjectInformationA 3367->3375 3368->3370 3370->3365 3371->3368 3371->3370 3374->3379 3375->3374 3380 40e53e-40e544 3375->3380 3382 40e5cb-40e617 call 40f8b0 3379->3382 3380->3374 3383 40e546-40e559 call 40f960 3380->3383 3382->3318 3389 40e55b 3383->3389 3390 40e55d-40e578 MessageBoxW 3383->3390 3389->3390 3392 40e57a-40e58c 3390->3392 3393 40e5ae-40e5b1 3390->3393 3394 40e5a4-40e5ab call 4141bf 3392->3394 3395 40e58e-40e59c 3392->3395 3393->3374 3396 40e5b3-40e5b8 3393->3396 3394->3393 3395->3394 3398 40e59e 3395->3398 3396->3382 3398->3394
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(004270B0,00000000,00000000,00000000,-00000002,?), ref: 0040E42C
                                                        • LeaveCriticalSection.KERNEL32(004270B0,?,?), ref: 0040E46E
                                                        • GetProcessWindowStation.USER32 ref: 0040E50C
                                                        • GetUserObjectInformationA.USER32(00000000,00000001,?,0000000C,00000000), ref: 0040E534
                                                        • MessageBoxW.USER32(00000000,00000000,Zoom VDI Workspace,00000134), ref: 0040E56A
                                                        • GetCurrentProcess.KERNEL32(00000000), ref: 0040E5BC
                                                        • TerminateProcess.KERNEL32(00000000), ref: 0040E5C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Process$CriticalSection$CurrentEnterInformationLeaveMessageObjectStationTerminateUserWindow
                                                        • String ID: Are you sure you want to run this software?$ from an unknown publisher.$ is using $/$Zoom VDI Workspace$\
                                                        • API String ID: 2420998183-416803619
                                                        • Opcode ID: 2bf8120df42d5ae13eb7732456e3f9a56e850d34b8fa7da0e23844d81cef106c
                                                        • Instruction ID: 267653b6ebe412005e2447c441a6f636b24535a257520f429c62a23f51abf88a
                                                        • Opcode Fuzzy Hash: 2bf8120df42d5ae13eb7732456e3f9a56e850d34b8fa7da0e23844d81cef106c
                                                        • Instruction Fuzzy Hash: 8BB1D131A00209DBCB14DFA5C995BEEB7B1EF44304F14893EE802A72D1DB78AD95CB58
                                                        APIs
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0042CA60,00000FA0,?,?,00414205), ref: 00414233
                                                        • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00414205), ref: 0041423E
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00414205), ref: 0041424F
                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00414261
                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0041426F
                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00414205), ref: 00414292
                                                        • DeleteCriticalSection.KERNEL32(0042CA60,00000007,?,?,00414205), ref: 004142B5
                                                        • CloseHandle.KERNEL32(00000000,?,?,00414205), ref: 004142C5
                                                        Strings
                                                        • kernel32.dll, xrefs: 0041424A
                                                        • WakeAllConditionVariable, xrefs: 00414267
                                                        • SleepConditionVariableCS, xrefs: 0041425B
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00414239
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 2565136772-3242537097
                                                        • Opcode ID: 7be4f200a74566f98bae5b6bf37b9bf44712cfd1cf6637fc1aae46b7f6747bf0
                                                        • Instruction ID: eadbdf53527f21697c7c976fa47b2d8f361e7f744fd41d0908bb9d316aa554bb
                                                        • Opcode Fuzzy Hash: 7be4f200a74566f98bae5b6bf37b9bf44712cfd1cf6637fc1aae46b7f6747bf0
                                                        • Instruction Fuzzy Hash: 7901D231B807156BDB209B70BD5DBDF3A98AF84B907144472FC01D2290EA788CC08A9D
                                                        APIs
                                                        • SysAllocString.OLEAUT32(?), ref: 00411609
                                                        • SysFreeString.OLEAUT32(-00000001), ref: 0041168E
                                                        • SysFreeString.OLEAUT32(-00000001), ref: 004116D1
                                                        • VariantClear.OLEAUT32(00000000), ref: 00411798
                                                        • VariantClear.OLEAUT32(00000001), ref: 00411807
                                                        • CoUninitialize.OLE32(?,?,?), ref: 0041183C
                                                        • _com_issue_error.COMSUPP ref: 00411862
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: String$ClearFreeVariant$AllocUninitialize_com_issue_error
                                                        • String ID: POWERPNT.exe$ProcessId$SELECT * FROM Win32_Process where name='%s'$WQL
                                                        • API String ID: 4015948099-2835684465
                                                        • Opcode ID: 4cae6ba28725c6cddbb5ed1f9e0ff0da51b4a2f84b92ba040e82ed207b66b41a
                                                        • Instruction ID: a58cffc29cf6f6dc8c416da25baa1a5b74b5660a5db0f35f5bfc5b23c7ff9db2
                                                        • Opcode Fuzzy Hash: 4cae6ba28725c6cddbb5ed1f9e0ff0da51b4a2f84b92ba040e82ed207b66b41a
                                                        • Instruction Fuzzy Hash: EC9191706043019FD310DF24C855F9BB7E8AF88708F14851EF559DB2A0EB79E985CB9A
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 004035C8
                                                        • TerminateThread.KERNEL32(00000000,00000000), ref: 00403737
                                                        • CloseHandle.KERNEL32(00000000), ref: 00403740
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        • TerminateThread.KERNEL32(00000000,00000000), ref: 00403840
                                                        • CloseHandle.KERNEL32(00000000), ref: 00403849
                                                        Strings
                                                        • [CDocConvert::CleanThread] TerminateThread m_hThreadDetect!, xrefs: 0040380F
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 004035E7, 0040366A, 004036E0, 0040377D, 004037EF
                                                        • [CDocConvert::CleanThread] m_eventExitConvertThreadRsp.Lock lockRet:, xrefs: 0040368B
                                                        • [CDocConvert::CleanThread] TerminateThread m_hThreadConvert!, xrefs: 004036FC
                                                        • [CDocConvert::CleanThread] m_eventExitDetectThreadRsp.Lock lockRet:, xrefs: 0040379E
                                                        • CDocConvert CleanThread , xrefs: 00403603
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleTerminateThread$H_prolog3ProtectVirtual
                                                        • String ID: CDocConvert CleanThread $[CDocConvert::CleanThread] TerminateThread m_hThreadConvert!$[CDocConvert::CleanThread] TerminateThread m_hThreadDetect!$[CDocConvert::CleanThread] m_eventExitConvertThreadRsp.Lock lockRet:$[CDocConvert::CleanThread] m_eventExitDetectThreadRsp.Lock lockRet:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 3327035812-490934195
                                                        • Opcode ID: ee8d1510abf3b5228d5ff3d454226bc46edae28d685278d321626e8e0c5e821f
                                                        • Instruction ID: c58c28c889137a41e0bcbd66b77d7563fd19abb7d98ff48b9d8d5a56de94fa08
                                                        • Opcode Fuzzy Hash: ee8d1510abf3b5228d5ff3d454226bc46edae28d685278d321626e8e0c5e821f
                                                        • Instruction Fuzzy Hash: 6E61A471950700ABD7249F60DC5ABDE7BB4FF08721F244A6EF452A61E1DBB85E80CA0C
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0040AC75
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040AC85
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • com.zoom.ipc.doccovtvbsapp_, xrefs: 0040AD73
                                                        • [CDocConvertVbsIPCServer::Init], xrefs: 0040ACA2
                                                        • [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer] chanel_name_:, xrefs: 0040ADD1
                                                        • , start_succ:, xrefs: 0040AF91
                                                        • [CDocConvertVbsIPCServer::Init] is_good:, xrefs: 0040AFA3
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040ACE5, 0040ADB1, 0040AEDD, 0040AF7A
                                                        • [CDocConvertVbsIPCServer::Init] ipc_server_:, xrefs: 0040AF00
                                                        • [CDocConvertVbsIPCServer::Init] is already inited. UnInit first., xrefs: 0040AD04
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskH_prolog3_ProtectVirtual
                                                        • String ID: , start_succ:$[CDocConvertVbsIPCServer::CDocConvertVbsIPCServer] chanel_name_:$[CDocConvertVbsIPCServer::Init]$[CDocConvertVbsIPCServer::Init] ipc_server_:$[CDocConvertVbsIPCServer::Init] is already inited. UnInit first.$[CDocConvertVbsIPCServer::Init] is_good:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp$com.zoom.ipc.doccovtvbsapp_
                                                        • API String ID: 2490808664-150838044
                                                        • Opcode ID: 53ac09ad68d1f9039d5a559351e08a01484ee2d6fa628184f6c129e6662fa568
                                                        • Instruction ID: 149bc477d0c5e852371e299875de303a08aa14c6ab15b4b396115825e528068c
                                                        • Opcode Fuzzy Hash: 53ac09ad68d1f9039d5a559351e08a01484ee2d6fa628184f6c129e6662fa568
                                                        • Instruction Fuzzy Hash: 22E1BC71900314ABDB149F64DD9ABDEBBB1FF48304F14806EE40AA72D1DB785E81CB19
                                                        APIs
                                                        • FreeLibrary.KERNEL32 ref: 0040A687
                                                        • GetProcAddress.KERNEL32 ref: 0040A497
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvertIPCAgent::LoadWebService] bRet:, xrefs: 0040A6DC
                                                        • [CDocConvertIPCAgent::LoadWebService] Error, pSBWebService is NULL!, xrefs: 0040A5D6
                                                        • zoomus.class.ISBWebServiceAPI, xrefs: 0040A583
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp, xrefs: 0040A4B9, 0040A531, 0040A5B4, 0040A61B, 0040A6B7
                                                        • [CDocConvertIPCAgent::LoadWebService] Error, pfInitModule is NULL!, xrefs: 0040A4DC
                                                        • [CDocConvertIPCAgent::LoadWebService] Error, pMQClientWebService is NULL!, xrefs: 0040A554
                                                        • [CDocConvertIPCAgent::LoadWebService] bRet is false, will unload!, xrefs: 0040A63B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProcProtectVirtual
                                                        • String ID: [CDocConvertIPCAgent::LoadWebService] Error, pMQClientWebService is NULL!$[CDocConvertIPCAgent::LoadWebService] Error, pSBWebService is NULL!$[CDocConvertIPCAgent::LoadWebService] Error, pfInitModule is NULL!$[CDocConvertIPCAgent::LoadWebService] bRet is false, will unload!$[CDocConvertIPCAgent::LoadWebService] bRet:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp$zoomus.class.ISBWebServiceAPI
                                                        • API String ID: 534670035-2533332826
                                                        • Opcode ID: 3290f3a2f0dd1c719ba24301017fcf22caaa84da7f66635076d447e772284814
                                                        • Instruction ID: af3e93a29a9dffe31318a46e62a52793d8324cc7d565a543d3ddef1080db9eef
                                                        • Opcode Fuzzy Hash: 3290f3a2f0dd1c719ba24301017fcf22caaa84da7f66635076d447e772284814
                                                        • Instruction Fuzzy Hash: D061CF72A40304ABE7149B64DC5ABEE77B0EF04720F24496EE512F62E1DBB84D81CA0D
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000), ref: 0041275C
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,?), ref: 004127F3
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412814
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412832
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00412881
                                                        • HeapFree.KERNEL32(00000000), ref: 00412888
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 0041289F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: TrustVerify$Heap$CreateFileFreeProcess
                                                        • String ID: 4
                                                        • API String ID: 844456146-4088798008
                                                        • Opcode ID: 9e3167213d219f8f1cf1ea40f5b04b6ce5d237ab1975849d844118587953a85b
                                                        • Instruction ID: 30a4058f0173cd2fa46ea9dbc6a0dfddb02297b452ecc5d162b3dce015d20828
                                                        • Opcode Fuzzy Hash: 9e3167213d219f8f1cf1ea40f5b04b6ce5d237ab1975849d844118587953a85b
                                                        • Instruction Fuzzy Hash: A65121B1D002499BDF10DFD9C984BEEBBB8BF48314F108229E815B7290D7B45999CF65
                                                        APIs
                                                        • GetProcAddress.KERNEL32(00000000,TermModule), ref: 0040A7E8
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0040A874
                                                        • __EH_prolog3.LIBCMT ref: 0040A720
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • TermModule, xrefs: 0040A7E0
                                                        • [CDocConvertIPCAgent::UnLoadWebService], xrefs: 0040A75B
                                                        • [CDocConvertIPCAgent::UnLoadWebService] return CmmTrue!, xrefs: 0040A8B4
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp, xrefs: 0040A732, 0040A743, 0040A7A4, 0040A806, 0040A894
                                                        • [CDocConvertIPCAgent::UnLoadWebService] Error, m_hModuleWebservice is NULL!, xrefs: 0040A7C0
                                                        • [CDocConvertIPCAgent::UnLoadWebService] Error, pfTermModule is NULL!, xrefs: 0040A826
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeH_prolog3LibraryProcProtectVirtual
                                                        • String ID: TermModule$[CDocConvertIPCAgent::UnLoadWebService]$[CDocConvertIPCAgent::UnLoadWebService] Error, m_hModuleWebservice is NULL!$[CDocConvertIPCAgent::UnLoadWebService] Error, pfTermModule is NULL!$[CDocConvertIPCAgent::UnLoadWebService] return CmmTrue!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertIPCAgent.cpp
                                                        • API String ID: 3777936632-3443123305
                                                        • Opcode ID: ceb88864714ad80e6b653e614704c2039d078bb7c436caedcb3683162fbccc4e
                                                        • Instruction ID: ba2ad7c8cb7d965e1e82bf5b0aabdcc5086ac0a5988c5af8798d1d52c742b88f
                                                        • Opcode Fuzzy Hash: ceb88864714ad80e6b653e614704c2039d078bb7c436caedcb3683162fbccc4e
                                                        • Instruction Fuzzy Hash: 3B41A172940300AFE714AB64DC5ABDE37B0FB04325F20897EE042A61E1DBBC9D91CA1D
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000,00429068,?,?), ref: 0041293A
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,?), ref: 004129A5
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 004129C6
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 004129E4
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 004129FE
                                                        • HeapFree.KERNEL32(00000000), ref: 00412A05
                                                        • WinVerifyTrust.WINTRUST(000000FF,00AAC56B,00000034), ref: 00412A1C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00412A35
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: TrustVerify$Heap$CloseCreateFileFreeHandleProcess
                                                        • String ID: 4
                                                        • API String ID: 2170017040-4088798008
                                                        • Opcode ID: 8770e014fbd8c3404b5246c69a0cf5acd8f86c54a6182c4c019deb2d28d51030
                                                        • Instruction ID: 4e2db92958abd06cf54a71d5c530e8a3d2865fa8e82589dd7844bb842cae8d26
                                                        • Opcode Fuzzy Hash: 8770e014fbd8c3404b5246c69a0cf5acd8f86c54a6182c4c019deb2d28d51030
                                                        • Instruction Fuzzy Hash: 8C4130B1D00218ABDB10CFD9DD84BDEBBB8EF04324F10422AE825B72D0D7B459458F64
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040C29C
                                                          • Part of subcall function 0040D0B0: SetDllDirectoryW.KERNEL32(00419D44), ref: 0040D0D1
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003), ref: 0040D107
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000001,00000003), ref: 0040D113
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000020,00000003,?,00000001,00000003), ref: 0040D11F
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D12B
                                                          • Part of subcall function 0040D0B0: VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 0040D13A
                                                          • Part of subcall function 0040D0B0: GetLastError.KERNEL32(?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D144
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D190
                                                          • Part of subcall function 0040D0B0: VerSetConditionMask.KERNEL32(00000000,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D19C
                                                          • Part of subcall function 0040D0B0: VerifyVersionInfoW.KERNEL32(?,00000003,00000000), ref: 0040D1AB
                                                          • Part of subcall function 0040D0B0: LoadLibraryExW.KERNEL32(cryptnet.dll,00000000,00000800,SOFTWARE\Microsoft\Cryptography\Defaults\Provider,Image Path,SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllOpenStoreProv,Dll,?,?,00000001,00000001,?,?,00000010,00000003), ref: 0040D1ED
                                                          • Part of subcall function 0040D0B0: GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D200
                                                          • Part of subcall function 0040D0B0: OpenProcessToken.ADVAPI32(00000000,?,?,00000001,00000001,?,?,00000010,00000003,?,00000020,00000003,?,00000001,00000003), ref: 0040D207
                                                          • Part of subcall function 00412270: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000), ref: 0041229A
                                                          • Part of subcall function 00412270: GetPrivateProfileStringW.KERNEL32(ZoomChat,com.zoom.test.disable_crash_handler,00000000,?,00000008,?), ref: 00412309
                                                          • Part of subcall function 00412270: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000000), ref: 00412340
                                                          • Part of subcall function 00412270: PathAppendW.SHLWAPI(?,ZoomVDI), ref: 00412357
                                                          • Part of subcall function 00412270: PathAppendW.SHLWAPI(?,logs), ref: 0041236A
                                                          • Part of subcall function 00412270: GetCurrentProcessId.KERNEL32 ref: 00412375
                                                          • Part of subcall function 00412270: OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00412388
                                                          • Part of subcall function 00412270: GetLastError.KERNEL32 ref: 00412396
                                                        • SetErrorMode.KERNEL32(00000002,?,000001B0), ref: 0040C2BD
                                                          • Part of subcall function 004121E0: GetModuleHandleW.KERNEL32(zCrashReport.dll,0040C2C8,?,000001B0), ref: 004121E5
                                                          • Part of subcall function 004121E0: GetProcAddress.KERNEL32(00000000,crSetCrashCallbackW), ref: 004121F5
                                                        • GetCurrentThreadId.KERNEL32 ref: 0040C31F
                                                        • SetConsoleCtrlHandler.KERNEL32(Function_0000C1F0,00000001), ref: 0040C331
                                                        • SetTimer.USER32(00000000,00000001,00000032,Function_0000C280), ref: 0040C340
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040C352
                                                        • TranslateMessage.USER32(?), ref: 0040C364
                                                        • DispatchMessageW.USER32(?), ref: 0040C371
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040C381
                                                        • SetConsoleCtrlHandler.KERNEL32(Function_0000C1F0,00000000), ref: 0040C38D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ConditionMask$MessagePathProcess$CurrentError$AppendConsoleCtrlFolderHandlerInfoLastOpenSpecialVerifyVersion$AddressDirectoryDispatchH_prolog3_HandleLibraryLoadModeModulePrivateProcProfileStringThreadTimerTokenTranslate
                                                        • String ID:
                                                        • API String ID: 3343810788-0
                                                        • Opcode ID: 8dadc06e9dbc00c87a32a17101f0fe4498e6a079432756071ec74662e6223704
                                                        • Instruction ID: 0df3743305b4662a0f30d548fb76cd88d12e2cbeb7f902348f3e3a882e6e6513
                                                        • Opcode Fuzzy Hash: 8dadc06e9dbc00c87a32a17101f0fe4498e6a079432756071ec74662e6223704
                                                        • Instruction Fuzzy Hash: 332151B1900219DBDB209B61DC98ADE7778BF46705F4086BAF506A21A0D7388E45CF59
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040BA6D
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                        Strings
                                                        • , nPageShowCount:, xrefs: 0040BC86
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strTaskID:, xrefs: 0040BC91
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] m_MessageHandler is NULL!, xrefs: 0040BB2B
                                                        • , nPageCount:, xrefs: 0040BC8C
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040BA97, 0040BB0B, 0040BC60, 0040BD10
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strIPCMessage:, xrefs: 0040BAB4
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] call HandleIPC_VBSIPCConvertProgressMessage., xrefs: 0040BD2D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$ProtectVirtual
                                                        • String ID: , nPageCount:$, nPageShowCount:$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] call HandleIPC_VBSIPCConvertProgressMessage.$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] m_MessageHandler is NULL!$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strIPCMessage:$[CDocConvertVbsIPCServer::Handle_VBSIPCGetSliderCountMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 624373510-3212152969
                                                        • Opcode ID: 33cc2ba9570ac06e666546046795ba742bea2b67b153925532d20454076ccba8
                                                        • Instruction ID: 4651389eddfd64d4942431231ff233d34f5cc01462db626f5184f5cb9502775e
                                                        • Opcode Fuzzy Hash: 33cc2ba9570ac06e666546046795ba742bea2b67b153925532d20454076ccba8
                                                        • Instruction Fuzzy Hash: 5A916B32904309ABDB159BA4DC99ADDBBB4EF18311F20802EE406B72D1DF785E85CB5C
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040BDA3
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] m_MessageHandler is NULL!, xrefs: 0040BE76
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strIPCMessage:, xrefs: 0040BDF6
                                                        • , strImgName:, xrefs: 0040BFC4
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] call HandleIPC_VBSIPCConvertProgressMessage., xrefs: 0040C07E
                                                        • , nPageFinishIndex:, xrefs: 0040BFD6
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strTaskID:, xrefs: 0040BFDB
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040BDD9, 0040BE56, 0040BFAE, 0040C061
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$ProtectVirtual
                                                        • String ID: , nPageFinishIndex:$, strImgName:$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] call HandleIPC_VBSIPCConvertProgressMessage.$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] m_MessageHandler is NULL!$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strIPCMessage:$[CDocConvertVbsIPCServer::Handle_VBSIPCConvertProgressMessage] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 624373510-647356355
                                                        • Opcode ID: 6eb867db84de515e8873a264e4678672b7ceeaedb205744788f40ebcfedc3da4
                                                        • Instruction ID: 469fe8e027f0674d6574de2f878ccbdcf436e3ac4ee0606df8ab73521b966ea5
                                                        • Opcode Fuzzy Hash: 6eb867db84de515e8873a264e4678672b7ceeaedb205744788f40ebcfedc3da4
                                                        • Instruction Fuzzy Hash: 1F918C7190020ADBDB149B64DD9ABDDBBB4EF04314F1080AEE50AB71E1DF385E85CB58
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00403C91
                                                        • CoUninitialize.OLE32 ref: 00403E2C
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        • _com_issue_error.COMSUPP ref: 00403E99
                                                        Strings
                                                        • [CDocConvert::ExitPPTApp] m_appPPT->Quit() , xrefs: 00403D72
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403CB0, 00403D4F, 00403DD8, 00403E42
                                                        • [CDocConvert::ExitPPTApp] m_appPPT->Release() , xrefs: 00403DF4
                                                        • [CDocConvert::ExitPPTApp] m_bInitApp: , xrefs: 00403CD6
                                                        • [CDocConvert::ExitPPTApp] End, xrefs: 00403E62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectUninitializeVirtual_com_issue_error
                                                        • String ID: [CDocConvert::ExitPPTApp] End$[CDocConvert::ExitPPTApp] m_appPPT->Quit() $[CDocConvert::ExitPPTApp] m_appPPT->Release() $[CDocConvert::ExitPPTApp] m_bInitApp: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 2656218265-3493313017
                                                        • Opcode ID: 68727294244794ec20b2fcd33cccc9c7da88c9a4e79c3c41485c4c0f148f8f61
                                                        • Instruction ID: 18cc4debb24305264030b38cec7edcd4e448e4ec5132a04508bf7c38e9d3671c
                                                        • Opcode Fuzzy Hash: 68727294244794ec20b2fcd33cccc9c7da88c9a4e79c3c41485c4c0f148f8f61
                                                        • Instruction Fuzzy Hash: C8519A32940714ABDB15DF60EC9ABDE7B74FF08321F24466EE411AA1E1CB785E81CA4C
                                                        APIs
                                                        Strings
                                                        • u32TimeoutMS:, xrefs: 00403165
                                                        • u64CurTicket:, xrefs: 0040315D
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403124
                                                        • [CDocConvert::ConvertDetectTimeout]! strDetectGUID: , xrefs: 00403172
                                                        • > u64Timestamp:, xrefs: 00403152
                                                        • enumDetectFunc: , xrefs: 0040316D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Count64H_prolog3_Tick
                                                        • String ID: > u64Timestamp:$ enumDetectFunc: $ u32TimeoutMS:$ u64CurTicket:$[CDocConvert::ConvertDetectTimeout]! strDetectGUID: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 2049389690-960057003
                                                        • Opcode ID: aeb70f4b85a6121d81040206a75301ce84ee70978a23e64459917e3ece7cfb56
                                                        • Instruction ID: 5c79b996fac3b27d7f1accdab238eb015067ee496fef3d9631b613940f5ef827
                                                        • Opcode Fuzzy Hash: aeb70f4b85a6121d81040206a75301ce84ee70978a23e64459917e3ece7cfb56
                                                        • Instruction Fuzzy Hash: 45413B72D04208AFDF05EFE4E8599DDBBB5AF08311F20842EF401B72E1DB7869818B58
                                                        APIs
                                                        • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?,?,?,?,00000118), ref: 0040D599
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000C7,00000000,00000000,00000000,00000000), ref: 0040D5D6
                                                        • RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00020019,?), ref: 0040D651
                                                        • RegGetValueW.ADVAPI32(00000000,00000000,?,0000FFFF,?,?,00000F9E), ref: 0040D6B4
                                                        • RegCloseKey.ADVAPI32(?), ref: 0040D6C2
                                                        • PathIsRelativeW.SHLWAPI(?), ref: 0040D706
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0040D722
                                                        • RegEnumKeyExW.ADVAPI32(?,00000001,?,?,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,00000118), ref: 0040D766
                                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000118), ref: 0040D780
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CloseEnumOpen$LibraryLoadPathRelativeValue
                                                        • String ID:
                                                        • API String ID: 1037566479-0
                                                        • Opcode ID: e0210c049c3d1df363a3a1cebf10b4b002481ffbb24948399b8ebf1762638dab
                                                        • Instruction ID: 192eedeed3cfc7c9a8b2c8425a5b0a1a089aeacab8846db5a4ff0d926e04e858
                                                        • Opcode Fuzzy Hash: e0210c049c3d1df363a3a1cebf10b4b002481ffbb24948399b8ebf1762638dab
                                                        • Instruction Fuzzy Hash: D261B435E00218ABDB349F94CC55FEB7378EB48744F0405AAFA09B7280D775AF89CA58
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00411653,00411655,00000000,00000000,?,00000000,00000008,?,00414680,00424798,000000FE,?,00411653,WQL), ref: 00413CD9
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00411653,?,00000000,00000000,?,00414680,00424798,000000FE,?,00411653), ref: 00413D54
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00413D5F
                                                        • _com_issue_error.COMSUPP ref: 00413D88
                                                        • _com_issue_error.COMSUPP ref: 00413D92
                                                        • GetLastError.KERNEL32(80070057,?,00000000,00000008,?,00414680,00424798,000000FE,?,00411653,WQL), ref: 00413D97
                                                        • _com_issue_error.COMSUPP ref: 00413DAA
                                                        • GetLastError.KERNEL32(00000000,?,00414680,00424798,000000FE,?,00411653,WQL,?,?,?,?,?,?,?,00000000), ref: 00413DC0
                                                        • _com_issue_error.COMSUPP ref: 00413DD3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                        • String ID:
                                                        • API String ID: 1353541977-0
                                                        • Opcode ID: f41af25578efc29595986d2abd5c4557e3d975c5f5e72a05fad108283b35a71f
                                                        • Instruction ID: 91591ea8f3ca65aa41be0f87e43bea3bc54f9acd7f89503e693b53a03cfc1328
                                                        • Opcode Fuzzy Hash: f41af25578efc29595986d2abd5c4557e3d975c5f5e72a05fad108283b35a71f
                                                        • Instruction Fuzzy Hash: 1C41F672A00219ABCB109F65D845BEFBBA8AB48715F14422FF515E7380D7389A8087E8
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040B7CF
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                          • Part of subcall function 0040BD99: __EH_prolog3_GS.LIBCMT ref: 0040BDA3
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo find_first_of STR_VBS_IPC_PARAMETER_DIVIDER failed! strVBSIPCInfo:, xrefs: 0040B916
                                                        • [CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo:, xrefs: 0040B897, 0040B9AA
                                                        • VBSConvertProgress, xrefs: 0040BA1F
                                                        • , strCmd:, xrefs: 0040B99E
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B86F, 0040B87E, 0040B8FD, 0040B98C
                                                        • VBSGetSliderCount, xrefs: 0040B9FC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$ProtectVirtual
                                                        • String ID: , strCmd:$VBSConvertProgress$VBSGetSliderCount$[CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo find_first_of STR_VBS_IPC_PARAMETER_DIVIDER failed! strVBSIPCInfo:$[CDocConvertVbsIPCServer::Handle_VBSIPCMessage] strVBSIPCInfo:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 624373510-2640463817
                                                        • Opcode ID: 4c79963274a99e6e87e80073ed61d85432a18d6ec956ebc9e7b6fdb969bcb2dc
                                                        • Instruction ID: 95473a93403c734b4744852b84c608a8a78e287613164ef3d788b91043617ffc
                                                        • Opcode Fuzzy Hash: 4c79963274a99e6e87e80073ed61d85432a18d6ec956ebc9e7b6fdb969bcb2dc
                                                        • Instruction Fuzzy Hash: 50716B72A00208AFDB05EB65DC69ADD7B75EF08314F1480AEE506A72E1DF385E85CB5C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040233A
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00402569
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 0040235B, 004024E0
                                                        • , hProcess:, xrefs: 00402503
                                                        • [CDocConvert::::HandleIPC_ImgCancelConvertRequest] strTaskID:, xrefs: 00402377
                                                        • [CDocConvert::HandleIPC_ImgCancelConvertRequest] strTaskID:, xrefs: 00402508
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3H_prolog3_ProcessProtectTerminateVirtual
                                                        • String ID: , hProcess:$[CDocConvert::::HandleIPC_ImgCancelConvertRequest] strTaskID:$[CDocConvert::HandleIPC_ImgCancelConvertRequest] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1443114193-3907194096
                                                        • Opcode ID: 62c1d0d3a1d2aa6c8f8c39956a4fa7234f39c7e915bfc192421f75184da31638
                                                        • Instruction ID: df8e3d83f7ba511f450b37bb38ee689344465493e2f3a48e0635173aeccd5823
                                                        • Opcode Fuzzy Hash: 62c1d0d3a1d2aa6c8f8c39956a4fa7234f39c7e915bfc192421f75184da31638
                                                        • Instruction Fuzzy Hash: 85814B70A00305AFCB04DFA4D999BEEBBB4BF08314F10816EE515A72D1DB78AA45CB59
                                                        APIs
                                                        • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?), ref: 0040EABC
                                                        • EnterCriticalSection.KERNEL32(?), ref: 0040EAF6
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0040EB32
                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 0040EB66
                                                        • WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 0040EB8D
                                                        • FlushFileBuffers.KERNEL32(?), ref: 0040EB9C
                                                        • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 0040EC65
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: File$CriticalMultipleObjectsSectionWait$BuffersEnterFlushLeavePointerWrite
                                                        • String ID:
                                                        • API String ID: 212290116-0
                                                        • Opcode ID: 0c28ca6caadaf3cd7fd16936cff9f9c79cba6f6055e8f539de9031ddcb989b14
                                                        • Instruction ID: e57b76790d50655fa2c6df5fcb4680fefcc05084cd1c1b2089238f56aaf1b74d
                                                        • Opcode Fuzzy Hash: 0c28ca6caadaf3cd7fd16936cff9f9c79cba6f6055e8f539de9031ddcb989b14
                                                        • Instruction Fuzzy Hash: CE615A71A00208AFDB14CFA9DD95BEEBBF4FB48310F14453AE916EB290D77469408B54
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 004020CA
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                          • Part of subcall function 00401B8F: __EH_prolog3_GS.LIBCMT ref: 00401B96
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402160
                                                        • strImgFolderPath:, xrefs: 00402188
                                                        • strDocFilePath:, xrefs: 0040218D
                                                        • [CDocConvert::::HandleIPC_ImgStartConvertRequest] strTaskID:, xrefs: 00402192
                                                        • strImgFormat:, xrefs: 00402183
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$ProtectVirtual
                                                        • String ID: strImgFolderPath:$ strDocFilePath:$ strImgFormat:$[CDocConvert::::HandleIPC_ImgStartConvertRequest] strTaskID:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 624373510-391708754
                                                        • Opcode ID: b347c1ec5e03e1f920b73b53c7eff73245ed50fb2dbedb36dde4246b0f2a28a8
                                                        • Instruction ID: 4298c3ca66f6c55349da1e56c2f7dc802e2da2487d28eea6cf766b38ea9a3579
                                                        • Opcode Fuzzy Hash: b347c1ec5e03e1f920b73b53c7eff73245ed50fb2dbedb36dde4246b0f2a28a8
                                                        • Instruction Fuzzy Hash: BC61793194021A9FCB24DF64D895BEDB7B1EF48314F1040AEE54AA3291DB74AE85CF08
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 0040331F
                                                          • Part of subcall function 0040385C: __EH_prolog3_GS.LIBCMT ref: 00403866
                                                        • Sleep.KERNEL32(00000028), ref: 004034AE
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403347, 004033BC, 004034FB
                                                        • [CDocConvert::ConvertDocThreadFunc] bInit: , xrefs: 00403364
                                                        • [CDocConvert::::ConvertDocThreadFunc] End! Exit thread!, xrefs: 00403521
                                                        • [CDocConvert::::ConvertDocThreadFunc] InitPPTApp failed ! exit thread!, xrefs: 004033DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_$ProtectSleepVirtual
                                                        • String ID: [CDocConvert::::ConvertDocThreadFunc] End! Exit thread!$[CDocConvert::::ConvertDocThreadFunc] InitPPTApp failed ! exit thread!$[CDocConvert::ConvertDocThreadFunc] bInit: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 2544358551-2000447865
                                                        • Opcode ID: 0cf408eb4a5164c052d667c61260c2e33cb84e120fbb79ec39a0b8052d1349c6
                                                        • Instruction ID: fc12af958fceb45b22afabc9c8cc1d154353b66f118d34e3f76e0e89f02dc691
                                                        • Opcode Fuzzy Hash: 0cf408eb4a5164c052d667c61260c2e33cb84e120fbb79ec39a0b8052d1349c6
                                                        • Instruction Fuzzy Hash: 2D518F31904704AFEB14EF61CC9ABD9BBB5EB04315F1084AEE40AA61E1DB785E84CF19
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040B3C4
                                                          • Part of subcall function 0040B6A9: __EH_prolog3.LIBCMT ref: 0040B6B3
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::PumpMessage] msg._message is NULL! return!, xrefs: 0040B56C
                                                        • [CDocConvertVbsIPCServer::PumpMessage] m_SaftyMessageVector is NULL! return!, xrefs: 0040B4F3
                                                        • , message size = , xrefs: 0040B463
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B43D, 0040B4D3, 0040B54B
                                                        • [CDocConvertVbsIPCServer::PumpMessage] i = , xrefs: 0040B471
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3
                                                        • String ID: , message size = $[CDocConvertVbsIPCServer::PumpMessage] i = $[CDocConvertVbsIPCServer::PumpMessage] m_SaftyMessageVector is NULL! return!$[CDocConvertVbsIPCServer::PumpMessage] msg._message is NULL! return!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 431132790-2754882026
                                                        • Opcode ID: 89dec19caac37b4c8b580c3a910641b03a2b4ef723a527013792012bb428126b
                                                        • Instruction ID: 180f00dd34122d70fab5881e58e1ba8803f1677b7fbebd3ec06e2c8a7cebe460
                                                        • Opcode Fuzzy Hash: 89dec19caac37b4c8b580c3a910641b03a2b4ef723a527013792012bb428126b
                                                        • Instruction Fuzzy Hash: 1D51AD71A41304ABDB149BA0DD5ABAD77B0EF44324F64457EE406B62E1CF7C5E818A4C
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32(?,004270B0), ref: 0040E0FC
                                                        • EnterCriticalSection.KERNEL32(?), ref: 0040E165
                                                        • LeaveCriticalSection.KERNEL32(?,?,?), ref: 0040E199
                                                        • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 0040E1A9
                                                        Strings
                                                        • didn't pass the verification, error code , xrefs: 0040E128
                                                        • loaded by , xrefs: 0040E0C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$CurrentEnterLeaveProcessReleaseSemaphore
                                                        • String ID: didn't pass the verification, error code $ loaded by
                                                        • API String ID: 61496330-2439791217
                                                        • Opcode ID: 3c26809dd974048e095aac905a104eef7292435528225e789fd9183ae77c5755
                                                        • Instruction ID: b52a9aa818815cb245682506643f326b322c2aa792aca06c5a04712bf6ea24bb
                                                        • Opcode Fuzzy Hash: 3c26809dd974048e095aac905a104eef7292435528225e789fd9183ae77c5755
                                                        • Instruction Fuzzy Hash: 3D519271A00209EBCB14DB75DC59BEEB7B5FB44304F00867AF41AA7291DB386D94CB98
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 004026EA
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::HandleIPC_VBSIPCPageNumberMessage] m_ipcSender is NULL!, xrefs: 0040272C
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402710, 00402790
                                                        • , m_strImgFolderPath:, xrefs: 004027A9
                                                        • , uPageShowNumTotal:, xrefs: 004027AF
                                                        • [CDocConvert::HandleIPC_VBSIPCPageNumberMessage] SendImgStartConvertResponse strTaskID:, xrefs: 004027BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: , m_strImgFolderPath:$, uPageShowNumTotal:$[CDocConvert::HandleIPC_VBSIPCPageNumberMessage] SendImgStartConvertResponse strTaskID:$[CDocConvertVbsIPCServer::HandleIPC_VBSIPCPageNumberMessage] m_ipcSender is NULL!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1809373692-2569159283
                                                        • Opcode ID: 52bf61267d8c5c46e6bcbc487db2412ca6a1e92767f63a18dccdb58333a4c9ae
                                                        • Instruction ID: 0ca3b86902d35b3fc8ab79bdec02e4fe5fcab68b8c9d7db7cc2c30c71c6b3825
                                                        • Opcode Fuzzy Hash: 52bf61267d8c5c46e6bcbc487db2412ca6a1e92767f63a18dccdb58333a4c9ae
                                                        • Instruction Fuzzy Hash: 4631AD31A40301AADB14AB64DC5AFEA3765EF48724F24843FF405AB2D2DFB95D82861C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040B02A
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::UnInit] is_inited_ is CmmFalse, don't need UnInit!, xrefs: 0040B0D0
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B04B, 0040B0B3, 0040B16B
                                                        • [CDocConvertVbsIPCServer::UnInit] Delete Message:, xrefs: 0040B18D
                                                        • [CDocConvertVbsIPCServer::UnInit], xrefs: 0040B068
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvertVbsIPCServer::UnInit]$[CDocConvertVbsIPCServer::UnInit] Delete Message:$[CDocConvertVbsIPCServer::UnInit] is_inited_ is CmmFalse, don't need UnInit!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 1809373692-2342135638
                                                        • Opcode ID: b39599eb63ae4a81e3128a8b4f6e4b531e4c273926c53cb63883c52ee9c3c8a1
                                                        • Instruction ID: aee573a8e460fd3a8d9e1b5fd3a726836f595948baa831e83ee989bba385e238
                                                        • Opcode Fuzzy Hash: b39599eb63ae4a81e3128a8b4f6e4b531e4c273926c53cb63883c52ee9c3c8a1
                                                        • Instruction Fuzzy Hash: 2751AD31A40715ABDB149BA0DC6ABDE7B70FF08721F10456EE511BB2D1CB785A81CB9C
                                                        APIs
                                                          • Part of subcall function 0041433A: EnterCriticalSection.KERNEL32(0042CA60,0042D2F0,?,?,0040C122,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 00414345
                                                          • Part of subcall function 0041433A: LeaveCriticalSection.KERNEL32(0042CA60,?,0040C122,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 00414382
                                                        • GetCurrentProcess.KERNEL32(?,?), ref: 00412C87
                                                        • IsWow64Process.KERNEL32(00000000), ref: 00412C8E
                                                        • RegGetValueW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,20010002,00000000,?,00000800), ref: 00412CED
                                                        Strings
                                                        • ProgramFilesDir, xrefs: 00412CDE
                                                        • SOFTWARE\Microsoft\Windows\CurrentVersion, xrefs: 00412CE3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CriticalProcessSection$CurrentEnterLeaveValueWow64
                                                        • String ID: ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
                                                        • API String ID: 623438262-1909746267
                                                        • Opcode ID: 8fc0ced0edc39a80b657f3c0fe8d7c359c6e872b154f47451c3c70d2233b6898
                                                        • Instruction ID: c3a08843d0d200cdbd3d1b2bcfc247f2eb322f66e650b1e7f1c13803f4fdb81c
                                                        • Opcode Fuzzy Hash: 8fc0ced0edc39a80b657f3c0fe8d7c359c6e872b154f47451c3c70d2233b6898
                                                        • Instruction Fuzzy Hash: 1641D070E003489ACB20DF54ED46BEA73B8BB04704F54817AE815D7290DBB85986CF9D
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00401FBA
                                                        • ExitProcess.KERNEL32 ref: 004020AC
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvert::OnChannelError], xrefs: 00401FF2
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00401FD6, 0040205A
                                                        • [CDocConvert::OnChannelError], ExitProcess!, xrefs: 00402079
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExitH_prolog3ProcessProtectVirtual
                                                        • String ID: [CDocConvert::OnChannelError]$[CDocConvert::OnChannelError], ExitProcess!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 4229167784-679568407
                                                        • Opcode ID: e49edd9864abbb3d87022385eb2d413356123a37627d111662b963a51c2ee4bf
                                                        • Instruction ID: 38f8ae0ac911da3a7bdad0eb44c8cb60196c5a814a9daa41f359f780c9d3694f
                                                        • Opcode Fuzzy Hash: e49edd9864abbb3d87022385eb2d413356123a37627d111662b963a51c2ee4bf
                                                        • Instruction Fuzzy Hash: 1B217C31A40700ABD7149BA0DD6ABDD3B70EB48710F20857EF116AA1E1DFB80D80CA1C
                                                        APIs
                                                        • GetModuleHandleA.KERNEL32(ntdll.dll,LdrUnregisterDllNotification), ref: 0040CE49
                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040CE50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: LdrUnregisterDllNotification$ntdll.dll
                                                        • API String ID: 1646373207-237666150
                                                        • Opcode ID: 081667f065d189619943f997a0d6da2d81fd1828666de2e48ae92a57e87b70f4
                                                        • Instruction ID: 536fe45db68da839303e439799dd04e2e917962dd37583a1d3a7b1c71cf5fa9c
                                                        • Opcode Fuzzy Hash: 081667f065d189619943f997a0d6da2d81fd1828666de2e48ae92a57e87b70f4
                                                        • Instruction Fuzzy Hash: 4C61C271700503ABD70C9B38D9A9BFAF7A6FF44344F144339E419876D1CB7969A48B88
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040B5CA
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • len:, xrefs: 0040B635
                                                        • [CDocConvertVbsIPCServer::OnMessageReceived] type:, xrefs: 0040B640
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B603
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: len:$[CDocConvertVbsIPCServer::OnMessageReceived] type:$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 1809373692-2074319829
                                                        • Opcode ID: 7471e48e2191e7f2eaa4730c6ef17b238e8e97372ab509c97a8fa65b74d9358d
                                                        • Instruction ID: 806908c14e0dff88c04ca793e9a98def4ac357006f8ff3ba3248fcedc08ac92e
                                                        • Opcode Fuzzy Hash: 7471e48e2191e7f2eaa4730c6ef17b238e8e97372ab509c97a8fa65b74d9358d
                                                        • Instruction Fuzzy Hash: C6216271A00305ABCB049FA4D855ADD7775FF48320F14856EE859AB2D0CB789D81CB8C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00402FBF
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        • Sleep.KERNEL32(00000028), ref: 00403089
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402FDD
                                                        • [CDocConvert::DetectThreadFunc], xrefs: 00402FF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectSleepVirtual
                                                        • String ID: [CDocConvert::DetectThreadFunc]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 4201259014-756957823
                                                        • Opcode ID: f8e9f0e23968f2bed3d0544a53d068131b256cc9dfe19466c324953f8a7454e9
                                                        • Instruction ID: 5e14cf88f44ae6e4a5dcb5661d55ffe10a5308fbadb8cd52eea9f61d4dc41f69
                                                        • Opcode Fuzzy Hash: f8e9f0e23968f2bed3d0544a53d068131b256cc9dfe19466c324953f8a7454e9
                                                        • Instruction Fuzzy Hash: F4219D30A01305EBDB04DF60CD5ABDCBAB4BB08315F50827EE41AA32E2CB785E45CA18
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040C1FA
                                                        • PostThreadMessageW.USER32(00000012,00000000,00000000), ref: 0040C26B
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [ConsoleCtrlhandler] CTRL_CLOSE_EVENT, xrefs: 0040C235
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\main.cpp, xrefs: 0040C219
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3MessagePostProtectThreadVirtual
                                                        • String ID: [ConsoleCtrlhandler] CTRL_CLOSE_EVENT$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\main.cpp
                                                        • API String ID: 2106445864-3568867012
                                                        • Opcode ID: 6af0ed5f76dcea0df63856a0bd80fcc9152b90093d9c2031062d343886322e88
                                                        • Instruction ID: 8af0f1432a38c39ac156a390085beae4290296724a84b2e37cf92d230908f7e1
                                                        • Opcode Fuzzy Hash: 6af0ed5f76dcea0df63856a0bd80fcc9152b90093d9c2031062d343886322e88
                                                        • Instruction Fuzzy Hash: 0601AD35A80304AAEB10ABA0CC9BFDA3670FF00705F10457EF501AA1D2CBB81D81CA1C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 004025EA
                                                        • ExitProcess.KERNEL32 ref: 00402653
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402606
                                                        • [CDocConvert::HandleIPC_ImgExitProcessRequest] Recv CSBMBMessage_Doc2ImgExitProcessRequest, ExitProcess!, xrefs: 00402622
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ExitH_prolog3ProcessProtectVirtual
                                                        • String ID: [CDocConvert::HandleIPC_ImgExitProcessRequest] Recv CSBMBMessage_Doc2ImgExitProcessRequest, ExitProcess!$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 4229167784-399022842
                                                        • Opcode ID: 68303deaeca0f61a469608444ec6b09118350651f39741b9a461f4fb4062dba4
                                                        • Instruction ID: 558ee970a2adf4e1fc46f8a3af44374caa6ca941988eab47a0cb853e066b6c20
                                                        • Opcode Fuzzy Hash: 68303deaeca0f61a469608444ec6b09118350651f39741b9a461f4fb4062dba4
                                                        • Instruction Fuzzy Hash: 2BF04931A80304AAE704AFA4DC6ABDD7670FB04711F10487EF102AA1E1CBB84D80CA1C
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(zCrashReport.dll,0040C2C8,?,000001B0), ref: 004121E5
                                                        • GetProcAddress.KERNEL32(00000000,crSetCrashCallbackW), ref: 004121F5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: crSetCrashCallbackW$zCrashReport.dll
                                                        • API String ID: 1646373207-1811286062
                                                        • Opcode ID: bb35c2366ebe50ab0f96784bce2b4b31de44ffc2a4ef195703e2f7f4e33b945d
                                                        • Instruction ID: 788238c6706ea16a2eee1a96d51a96658a6dcae04bbc94478e2843e4b5f40ba0
                                                        • Opcode Fuzzy Hash: bb35c2366ebe50ab0f96784bce2b4b31de44ffc2a4ef195703e2f7f4e33b945d
                                                        • Instruction Fuzzy Hash: 52D0123838130225DD1027B26E09FCE26042B40F11F644AA2B831E11D5EBFCC591502D
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000001,00000000,00000000,00000000,?), ref: 00411267
                                                        • GetLastError.KERNEL32 ref: 00411273
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastOpenProcess
                                                        • String ID:
                                                        • API String ID: 919517065-0
                                                        • Opcode ID: 180b963629b25771218858fb9be680c45ebcaf4e685314d94568f095a85c1d83
                                                        • Instruction ID: df430542db87c27eb6bb0a20753aa050ff356964e4e46c6d4fd600331b1f44f8
                                                        • Opcode Fuzzy Hash: 180b963629b25771218858fb9be680c45ebcaf4e685314d94568f095a85c1d83
                                                        • Instruction Fuzzy Hash: E031F871E002099BDB14DFA8DC957EEB7B5EF48304F5442AAE905F7290DB749E80CB94
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(0042CA60,?,?,0040C13C,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004142FA
                                                        • LeaveCriticalSection.KERNEL32(0042CA60,?,0040C13C,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 0041432D
                                                        • SetEvent.KERNEL32(?,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004143AE
                                                        • ResetEvent.KERNEL32(?,0042D2F0,?,?,0040B6D2,?,000000B4,0040B3DE,0000016C), ref: 004143BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CriticalEventSection$EnterLeaveReset
                                                        • String ID:
                                                        • API String ID: 3553466030-0
                                                        • Opcode ID: 011063dab18d76bc8b03866032b575e26ed5f704ee7c2b09c1e2fe64b6e0426c
                                                        • Instruction ID: e09fd4ba703b3f4f90ed7c4f0adbe9ef2044be7fde56f23161c9f76c561368eb
                                                        • Opcode Fuzzy Hash: 011063dab18d76bc8b03866032b575e26ed5f704ee7c2b09c1e2fe64b6e0426c
                                                        • Instruction Fuzzy Hash: 9001F636B41528EFCB25EF18FC98AD97BA5EB49751B41807AE90297320CB345C029B9C
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 004109E7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID: }A$m@
                                                        • API String ID: 118556049-736616827
                                                        • Opcode ID: c679fcf57494bb239db96a3548e4c720a31c8a11289dfd5385f4546d284e78a0
                                                        • Instruction ID: c3dfcaa805bbc8a51e55aaabc3e4a89111bc7eceac5f2a1566f87b27f93fef33
                                                        • Opcode Fuzzy Hash: c679fcf57494bb239db96a3548e4c720a31c8a11289dfd5385f4546d284e78a0
                                                        • Instruction Fuzzy Hash: D051C3B2A001099FDB08DF69C991AEEB7F5EF88300F14812AE506D7351D778AD95CB94
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00401C97
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvert::CDocConvert], xrefs: 00401DF8
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00401DDB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvert::CDocConvert]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1809373692-1479113695
                                                        • Opcode ID: d8c234d8f344c7166d2f66105d34b04a422d9a5bfd5bf7b32b886f0fdc852b4e
                                                        • Instruction ID: a40a2f0a47e0f672c9afa67fb71f5c4737df055ac14e51e82bc3df37677841b0
                                                        • Opcode Fuzzy Hash: d8c234d8f344c7166d2f66105d34b04a422d9a5bfd5bf7b32b886f0fdc852b4e
                                                        • Instruction Fuzzy Hash: E85125B0900742EFD704DF25C999789FFF0BF18304F50856ED14AA7292DB78AA94CB99
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00403258
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00403299
                                                        • [CDocConvert::CreateConvertThread] bRet: , xrefs: 004032BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvert::CreateConvertThread] bRet: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1809373692-452567957
                                                        • Opcode ID: 99adcce184ba34fee4a85432692fe05538fd99e2266a5797d6a7ab14f0574b05
                                                        • Instruction ID: adf8f5ce9188c4b8668094b64460cc229a608b819f9a05dea54ebcbb5ebed4ec
                                                        • Opcode Fuzzy Hash: 99adcce184ba34fee4a85432692fe05538fd99e2266a5797d6a7ab14f0574b05
                                                        • Instruction Fuzzy Hash: D4117971A40315ABDB04AFA4DC56AEE7AA8EB04315F50447EF402B72D1CB785E818AAC
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00402EF6
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402F37
                                                        • [CDocConvert::CreateDetectThread] bRet: , xrefs: 00402F58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvert::CreateDetectThread] bRet: $c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1809373692-1270373286
                                                        • Opcode ID: f36e3a4818fa31f1cf2a13d5cc227d8049b27aa70c011b65117d2f714605032c
                                                        • Instruction ID: 0d6e37797b63617483badd5a7fd61e6ecb8421c5efb43924a2aa00c28a8240d4
                                                        • Opcode Fuzzy Hash: f36e3a4818fa31f1cf2a13d5cc227d8049b27aa70c011b65117d2f714605032c
                                                        • Instruction Fuzzy Hash: B111A9B1A41316ABDB04AF60DD5ABEE76B8EF04311F50447EF402F72D1CAB85D808A6C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040B221
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer], xrefs: 0040B2CB
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B2AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvertVbsIPCServer::CDocConvertVbsIPCServer]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 1809373692-330505927
                                                        • Opcode ID: 2fd0d4eb773c3e8d501f0b16aa810d208dbfdecc74343adaf8774b261c04853f
                                                        • Instruction ID: 00befacb907631c9e17a7b3fa5999c24b6eceef9975b5f24643841f7cb668f1b
                                                        • Opcode Fuzzy Hash: 2fd0d4eb773c3e8d501f0b16aa810d208dbfdecc74343adaf8774b261c04853f
                                                        • Instruction Fuzzy Hash: 3C1167B0E003109FD7149F65EC5A6A87BB1FB08304FA084BEE005A76A0CBB80991CB0E
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040B6B3
                                                          • Part of subcall function 0040B020: __EH_prolog3.LIBCMT ref: 0040B02A
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • [CDocConvertVbsIPCServer::HandleConnectingTimeout] connecting timeout., xrefs: 0040B714
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp, xrefs: 0040B6F8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3$ProtectVirtual
                                                        • String ID: [CDocConvertVbsIPCServer::HandleConnectingTimeout] connecting timeout.$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvertVbsIPCServer.cpp
                                                        • API String ID: 3007236580-901364601
                                                        • Opcode ID: e35b6af78b42fc06780ffa3eb587207b71c6ccf129391efccff88d3d12cf072f
                                                        • Instruction ID: a9d0bb768643340a5ea1168fb03230a697b43f5db5e869853af32c9bcaec17c0
                                                        • Opcode Fuzzy Hash: e35b6af78b42fc06780ffa3eb587207b71c6ccf129391efccff88d3d12cf072f
                                                        • Instruction Fuzzy Hash: 4A018871940700AADB28AF61CCA7AEA7260EB44714F50457FE442A76E2DBBC5C81CA5C
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 0040266A
                                                          • Part of subcall function 00408170: VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 00408645
                                                        Strings
                                                        • c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp, xrefs: 00402686
                                                        • [CDocConvert::OnIPCServerChannelError], xrefs: 004026A2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3ProtectVirtual
                                                        • String ID: [CDocConvert::OnIPCServerChannelError]$c:\jenkins\workspace\Client\Client\Windows_VDI\release\client-app-video\zDocConvert\DocConvert.cpp
                                                        • API String ID: 1809373692-3070404389
                                                        • Opcode ID: 4ca598820c89b7f3b870ffea1a173ab30c14d89fcf2580a0d6d755e8ac5f4b0c
                                                        • Instruction ID: 35197b002a70b5b2eeeaaf07b04524d3dbd07c7745c84826511f01a8e825cf61
                                                        • Opcode Fuzzy Hash: 4ca598820c89b7f3b870ffea1a173ab30c14d89fcf2580a0d6d755e8ac5f4b0c
                                                        • Instruction Fuzzy Hash: 6EF01771980345AAE714AB64DD5BBDD3664EB04714F60487EE401AA2E1CBBC5DC18A1C
                                                        APIs
                                                          • Part of subcall function 00401B22: InitializeCriticalSectionEx.KERNEL32(0042CA0C,00000000,00000000,0042C9F8,00413BB5,?,?,?,004019CA), ref: 00401B28
                                                          • Part of subcall function 00401B22: GetLastError.KERNEL32(?,?,?,004019CA), ref: 00401B32
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,004019CA), ref: 00413BB9
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,004019CA), ref: 00413BC8
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00413BC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 3511171328-631824599
                                                        • Opcode ID: 199956a563438f3586a61a4a6f19ccc57f1881164043d3a7314101558bc9cb29
                                                        • Instruction ID: 8b65f71d81d517f14160c623eaecbed840306f26d5a6cb6b6d2c6e55611105c0
                                                        • Opcode Fuzzy Hash: 199956a563438f3586a61a4a6f19ccc57f1881164043d3a7314101558bc9cb29
                                                        • Instruction Fuzzy Hash: 47E065702047108BC3309F25E9143827AE4AF04709F00887FE456D2291E7B8FA84CB59
                                                        APIs
                                                        • GetProcessHeap.KERNEL32 ref: 0040E679
                                                        • HeapAlloc.KERNEL32(00000000), ref: 0040E680
                                                          • Part of subcall function 0040F130: GetCurrentProcess.KERNEL32(?,?,?,?,?,?), ref: 0040F17E
                                                          • Part of subcall function 0040F130: GetMappedFileNameW.PSAPI(00000000,?,?,?), ref: 0040F185
                                                          • Part of subcall function 0040F130: GetLogicalDriveStringsW.KERNEL32(00000103,?,?,?,?,?,?,?), ref: 0040F1DA
                                                          • Part of subcall function 0040F130: QueryDosDeviceW.KERNEL32(00000FA0,?,00000103,?,?,?,?,?,?), ref: 0040F214
                                                        • GetProcessHeap.KERNEL32(00000000,00000FA0,?,?,00000001), ref: 0040E6E4
                                                        • HeapFree.KERNEL32(00000000), ref: 0040E6EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocCurrentDeviceDriveFileFreeLogicalMappedNameQueryStrings
                                                        • String ID:
                                                        • API String ID: 1064646199-0
                                                        • Opcode ID: 0c5f043bf4b246922cf2179a9f600e16eea6433679b903cdfe6c1f12932328f2
                                                        • Instruction ID: 2668c3dfdd3c3276348bbd43bb132a3e152f58a801efa895f745a1c07ca89cb8
                                                        • Opcode Fuzzy Hash: 0c5f043bf4b246922cf2179a9f600e16eea6433679b903cdfe6c1f12932328f2
                                                        • Instruction Fuzzy Hash: C811D034104301EBCB249F62D884BAB77A8AF44755F40CD2EFD55972E0DBB5A824CB5A
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000000,?,00000000,0040DAF3), ref: 0040D7E0
                                                        • HeapFree.KERNEL32(00000000), ref: 0040D7E7
                                                        • GetProcessHeap.KERNEL32(00000000,?,00000000,0040DAF3), ref: 0040D800
                                                        • HeapFree.KERNEL32(00000000), ref: 0040D807
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2191935852.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2191805478.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192361425.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192581691.000000000042B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192655196.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192669313.000000000042E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192731013.0000000000430000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192783114.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192824126.0000000000436000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192844518.000000000043A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192881622.0000000000465000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2192909532.000000000048A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193047505.000000000051D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193064528.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193153676.000000000060E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000615000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000618000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.0000000000657000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193168174.00000000006DA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193575077.00000000006EB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.00000000006EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2193600596.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_MicrosoftOfficeWord.jbxd
                                                        Similarity
                                                        • API ID: Heap$FreeProcess
                                                        • String ID:
                                                        • API String ID: 3859560861-0
                                                        • Opcode ID: 1c561bf052e99d539f3441f41995ab45b4dfc28fc98b83e691970e21491ed14b
                                                        • Instruction ID: 5d4cdb0425c937855427814b3bc534e629d3b797dcae5c9850f92b4c5cd28c0b
                                                        • Opcode Fuzzy Hash: 1c561bf052e99d539f3441f41995ab45b4dfc28fc98b83e691970e21491ed14b
                                                        • Instruction Fuzzy Hash: 4BF054B57002109BD7349F94EE58BDA7778B75C702F418939EC01935A4CB7C881A875A

                                                        Execution Graph

                                                        Execution Coverage:13.3%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:8%
                                                        Total number of Nodes:50
                                                        Total number of Limit Nodes:5
                                                        execution_graph 36797 55aca08 36798 55aca48 CloseHandle 36797->36798 36800 55aca79 36798->36800 36747 6e951c0 36748 6e951d5 36747->36748 36750 6e95509 36748->36750 36752 6e95512 36750->36752 36751 6e9556f 36751->36748 36752->36751 36757 9abfa88 36752->36757 36764 9abfa50 36752->36764 36772 9abfa78 36752->36772 36779 9803925 36752->36779 36760 9abfa93 36757->36760 36758 9abfa9f 36758->36752 36759 9abfb26 KiUserExceptionDispatcher 36759->36760 36760->36758 36760->36759 36761 6e9fac0 LdrInitializeThunk 36760->36761 36762 6e9fab0 LdrInitializeThunk 36760->36762 36763 6e9fbb1 LdrInitializeThunk 36760->36763 36761->36760 36762->36760 36763->36760 36765 9abfa5f 36764->36765 36768 9abfa7b 36764->36768 36765->36752 36766 9abfa9f 36766->36752 36767 9abfb26 KiUserExceptionDispatcher 36767->36768 36768->36766 36768->36767 36769 6e9fbb1 LdrInitializeThunk 36768->36769 36770 6e9fac0 LdrInitializeThunk 36768->36770 36771 6e9fab0 LdrInitializeThunk 36768->36771 36769->36768 36770->36768 36771->36768 36775 9abfa87 36772->36775 36773 9abfa9f 36773->36752 36774 9abfb26 KiUserExceptionDispatcher 36774->36775 36775->36773 36775->36774 36776 6e9fbb1 LdrInitializeThunk 36775->36776 36777 6e9fac0 LdrInitializeThunk 36775->36777 36778 6e9fab0 LdrInitializeThunk 36775->36778 36776->36775 36777->36775 36778->36775 36780 980393b 36779->36780 36785 6e9fab0 36780->36785 36789 6e9fac0 36780->36789 36793 6e9fbb1 36780->36793 36781 980395c 36787 6e9fabf 36785->36787 36786 6e9fb78 LdrInitializeThunk 36788 6e9fb8e 36786->36788 36787->36786 36787->36788 36788->36781 36792 6e9fadb 36789->36792 36790 6e9fb78 LdrInitializeThunk 36791 6e9fb8e 36790->36791 36791->36781 36792->36790 36792->36791 36794 6e9fb2a 36793->36794 36795 6e9fb78 LdrInitializeThunk 36794->36795 36796 6e9fb8e 36794->36796 36795->36796 36801 55ac7a0 36803 55ac7b3 36801->36803 36805 55ac858 36803->36805 36806 55ac8a0 VirtualProtect 36805->36806 36808 55ac83b 36806->36808
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899453490.0000000009AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09AB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9ab0000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39c6032e4a93caeba1de2818149ef4f8af3f9cc03c387c5a8e8385386c14fc3d
                                                        • Instruction ID: b803ca3a8d1d558b43bac348e8fe29370195aedc6ad60b2e3b108f5c7d9bade6
                                                        • Opcode Fuzzy Hash: 39c6032e4a93caeba1de2818149ef4f8af3f9cc03c387c5a8e8385386c14fc3d
                                                        • Instruction Fuzzy Hash: 30515E707002118FD788EB68DA59BBA37EAEF9C250B095079E01ACB787CE385809C759
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898640961.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e90000_csc.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: d2d33dae2a092fe4d85e8eaabaa8a68e6b4a63180a28775bb312048f96b7758d
                                                        • Instruction ID: 8aabf860ce28cd8840a58bb3f4076833a9a408bc9c22b0df1fd60f49f63d3ba6
                                                        • Opcode Fuzzy Hash: d2d33dae2a092fe4d85e8eaabaa8a68e6b4a63180a28775bb312048f96b7758d
                                                        • Instruction Fuzzy Hash: 10517A30A01304CFEF94CF25D6597E977B3EF88314F24A46AD005EB295EB349985CB69
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 09ABFB2A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899453490.0000000009AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09AB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9ab0000_csc.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 446ee54e1c32564e37b116f93d5eedba0c92f189f606c6959ab6b61770df3f83
                                                        • Instruction ID: 26a32fe558c67ffe80908a228e300598bf9afe11a5e502e010d64f5b31160a0b
                                                        • Opcode Fuzzy Hash: 446ee54e1c32564e37b116f93d5eedba0c92f189f606c6959ab6b61770df3f83
                                                        • Instruction Fuzzy Hash: 2D514E347005118FD788EB68DA99BFA37EAEF9C250B09507DE01ACB787DE385809C759
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 09ABFB2A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899453490.0000000009AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09AB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9ab0000_csc.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: ea39eef30ff09388d56a028f53fa7e3cefbeaa9326e656547c4733bea3942a21
                                                        • Instruction ID: e4ef6f338d83534ec6975d848566f07b37c9593fa7e1ff57d8f08823b570082b
                                                        • Opcode Fuzzy Hash: ea39eef30ff09388d56a028f53fa7e3cefbeaa9326e656547c4733bea3942a21
                                                        • Instruction Fuzzy Hash: BF513E347005118FD784EB68DA99BBA37EAEF9C250B49507DE01ACB787CE385C09C759
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vkm
                                                        • API String ID: 0-2107937421
                                                        • Opcode ID: 000918c47df3f84058f141fea3893989d272b8133d1d343a14b5b073f1cb8062
                                                        • Instruction ID: 8a44997cbbb33327578af5acc4055d3377e36e6231defe59b2af0e9e75f2027b
                                                        • Opcode Fuzzy Hash: 000918c47df3f84058f141fea3893989d272b8133d1d343a14b5b073f1cb8062
                                                        • Instruction Fuzzy Hash: C4912A70E002099FDF54CFA9C99979DBBF2AF88314F14812DE429E7394EBB49845CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bc58d00b6e1c92dd8bbe2c983d572dea103d06f9a1719c958fb337ca96a42c23
                                                        • Instruction ID: 27d20767f8ed80e5b8089595185d2b2c3614f479178508e1e9dc7d37f3224fd7
                                                        • Opcode Fuzzy Hash: bc58d00b6e1c92dd8bbe2c983d572dea103d06f9a1719c958fb337ca96a42c23
                                                        • Instruction Fuzzy Hash: 69E13834A00104CFE784CF18DDA9BA977F2FB88314F2580A9E516DB7A2C778AD85CB55
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8a7e51c94ec8a2f3ecf3baf027399014f6db3f370fbf28476d490daa35477c96
                                                        • Instruction ID: 0112f1bb8f1a130d5bc54ffc5187fde40375013423d341b5d43cd89f8917649a
                                                        • Opcode Fuzzy Hash: 8a7e51c94ec8a2f3ecf3baf027399014f6db3f370fbf28476d490daa35477c96
                                                        • Instruction Fuzzy Hash: B1E13634A00104CFE784CF18DDA9BA977F2FB88314F2580A8E516DB7A2C778AD85CB55
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bdae35cd7fd378ecdcde6cd67eb704f3edcae33feaccde7efa9dfee3f0363991
                                                        • Instruction ID: 59f7de122c9a1b5d3d7b3fa06e401ac374bb060e61f238b01e92a2dcf602faa3
                                                        • Opcode Fuzzy Hash: bdae35cd7fd378ecdcde6cd67eb704f3edcae33feaccde7efa9dfee3f0363991
                                                        • Instruction Fuzzy Hash: DEC15F34A41218CFDB84DB74C954BA973F3FF89304F54806DD2169B3A6EB389845CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: facc49c04995479ad4644fff5dcf0aa1000e873b964017e83aa8a3dc0d82c57c
                                                        • Instruction ID: 1f8e684bf2c89a9e099d836780c804bf7ce6194c90e18b2633dc36d314b0eb61
                                                        • Opcode Fuzzy Hash: facc49c04995479ad4644fff5dcf0aa1000e873b964017e83aa8a3dc0d82c57c
                                                        • Instruction Fuzzy Hash: 9DC15E34A41218CFDB84DB74C964BA973F3FF89304F54806CD2169B7A6EB38A845CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e93b1bb7922722ac21446528cf60eb8c96eacce218a82b73a7abdf6d9a4ac9f
                                                        • Instruction ID: 69d3017d19243464a17db453f954fcac6003f984c52b2ffb8b50cb40b0a4baaa
                                                        • Opcode Fuzzy Hash: 1e93b1bb7922722ac21446528cf60eb8c96eacce218a82b73a7abdf6d9a4ac9f
                                                        • Instruction Fuzzy Hash: D5C11434A00104CFE784CF18DDA9BA977F2FB88314F2580A8E516DB7A2C779AD85CB54
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 13d69b5bba2bdfaedeee053eda0b667611268a7454291f6a386586db806bdad9
                                                        • Instruction ID: c00962b31c9a624135bc9693e85a53d05b17e4f58cc36908839a4d094933ba09
                                                        • Opcode Fuzzy Hash: 13d69b5bba2bdfaedeee053eda0b667611268a7454291f6a386586db806bdad9
                                                        • Instruction Fuzzy Hash: EBB14B71E002098FDB50CFA9C8957AEBBF2AF88354F14812DE419E7394EB749895CB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f3f4241bb3325bd0b21a77417964ce86620777d3c938d5d1b450a8d3ff6c229a
                                                        • Instruction ID: 40e7413a7cc0e48756511703905a733531cab2d081428402acf9d71415a7c68f
                                                        • Opcode Fuzzy Hash: f3f4241bb3325bd0b21a77417964ce86620777d3c938d5d1b450a8d3ff6c229a
                                                        • Instruction Fuzzy Hash: EB913D34A41208CFEB94CF74C9A4BA977F3FB85304F54816DD2069B3A5EB389885CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0be05e032e143206ddd01866d588a76f7dd019181ad0adaf708e1f1e45941d29
                                                        • Instruction ID: b4f28808a72954f9df6468774904ada4d6d64eb8f003211fc5c9a4966eef8bcf
                                                        • Opcode Fuzzy Hash: 0be05e032e143206ddd01866d588a76f7dd019181ad0adaf708e1f1e45941d29
                                                        • Instruction Fuzzy Hash: A2919C30A04115CFEB94CB28DD69BA973F6EBD8304F14806DD106EB7E2DB789946CB49
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e29a711a8a033f7b176b1517a6e9fb601415adfe1aaa616c91148c59a321aa4
                                                        • Instruction ID: a06e55650c8a9563f30238d469de542e844700f197c7f2d37182db4007b9d256
                                                        • Opcode Fuzzy Hash: 5e29a711a8a033f7b176b1517a6e9fb601415adfe1aaa616c91148c59a321aa4
                                                        • Instruction Fuzzy Hash: D081BC30A00115CFEB84CB28DE69BA973F6EBD8304F14806DD106EB7E2DB399945CB49

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 658 9806328-980633e 659 9806340-9806345 658->659 660 9806346-9806361 658->660 659->660 663 9806363-980636f 660->663 664 98063d7-98063fc 660->664 667 9806403-9806468 663->667 668 9806375-980638b 663->668 664->667 685 9806490-980649e 667->685 686 980646a-980646c 667->686 675 980638d-980639c 668->675 676 980639e-98063ba 668->676 675->676 683 98063c4 676->683 684 98063bc-98063c2 676->684 687 98063c8-98063d4 683->687 684->687 696 98064a0-98064ae 685->696 697 98064d3-98064de 685->697 688 9806472-9806477 686->688 689 980650b-9806530 686->689 690 9806481-980648d 688->690 691 9806479-980647b 688->691 695 9806537-980655b 689->695 691->690 691->695 707 9806562-98065b5 695->707 705 98064b0-98064c1 696->705 706 98064c4-98064c6 696->706 703 98064e0-9806504 697->703 704 98064cc-98064d0 697->704 703->689 706->704 706->707 719 9806610-980664d 707->719 720 98065b7-98065cd 707->720 725 98065e5-98065fd 720->725 726 98065cf-98065da call 9806698 720->726 730 9806608-980660d 725->730 731 98065ff 725->731 729 98065dd-98065e2 726->729 731->730
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (aq$(aq$(aq$Haq
                                                        • API String ID: 0-3649692834
                                                        • Opcode ID: 4610f1b2d66e0f05be8d1d541503fd4fe808476f03d44fcdbb6b00d66b599466
                                                        • Instruction ID: f46b28fc6bef9d312e3966157d2965ffbf16e91cc46331eb98382625ec530fc6
                                                        • Opcode Fuzzy Hash: 4610f1b2d66e0f05be8d1d541503fd4fe808476f03d44fcdbb6b00d66b599466
                                                        • Instruction Fuzzy Hash: C48113317082514FC7569B3898A0AAE7FE6EFC5310B5585AEE509CB3D6EE34DC06C3A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898625887.0000000006E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e80000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4']q$4']q
                                                        • API String ID: 0-3120983240
                                                        • Opcode ID: ca1536a00cba9fd1e7a53a7a4567e8876b877634aa65ba8ba77f3b2bf4108e4a
                                                        • Instruction ID: b792bf26dfe88f1c6262b067b64fb1129be0201abdec014f41d4ff9c8ab8b720
                                                        • Opcode Fuzzy Hash: ca1536a00cba9fd1e7a53a7a4567e8876b877634aa65ba8ba77f3b2bf4108e4a
                                                        • Instruction Fuzzy Hash: 9102F330F503188F9BB63668066C63E2EAA9FD4658F50546DD90FE7394DF2A8C0DC792

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1749 6e80810-6e80827 1750 6e80829-6e8082f 1749->1750 1751 6e8083f-6e80841 1749->1751 1752 6e80831 1750->1752 1753 6e80833-6e8083d 1750->1753 1754 6e80c52-6e80c5d 1751->1754 1752->1751 1753->1751 1757 6e80c63-6e80c65 1754->1757 1758 6e80846-6e80849 1754->1758 1761 6e80c85-6e80c87 1757->1761 1762 6e80c67-6e80c7d 1757->1762 1759 6e8084f-6e80851 1758->1759 1760 6e808e3-6e808e6 1758->1760 1765 6e80871-6e80880 1759->1765 1766 6e80853-6e80869 1759->1766 1763 6e808ec-6e808ee 1760->1763 1764 6e809dd-6e809e0 1760->1764 1767 6e80c89-6e80c8f 1761->1767 1768 6e80ca1-6e80caa 1761->1768 1762->1761 1771 6e8090e-6e8091d 1763->1771 1772 6e808f0-6e80906 1763->1772 1769 6e80a1e-6e80a21 1764->1769 1770 6e809e2-6e809e4 1764->1770 1790 6e8089d-6e808a0 1765->1790 1791 6e80882-6e8089b 1765->1791 1766->1765 1774 6e80c91 1767->1774 1775 6e80c93-6e80c9f 1767->1775 1779 6e80a23-6e80a25 1769->1779 1780 6e80a64-6e80a67 1769->1780 1776 6e80a04-6e80a19 1770->1776 1777 6e809e6-6e809fc 1770->1777 1795 6e8093a-6e8093e 1771->1795 1796 6e8091f-6e80938 1771->1796 1772->1771 1774->1768 1775->1768 1776->1754 1777->1776 1788 6e80a45-6e80a4f 1779->1788 1789 6e80a27-6e80a3d 1779->1789 1785 6e80a69-6e80a6b 1780->1785 1786 6e80aaa-6e80aad 1780->1786 1793 6e80a8b-6e80a95 1785->1793 1794 6e80a6d-6e80a83 1785->1794 1800 6e80ae8-6e80aeb 1786->1800 1801 6e80aaf-6e80ab1 1786->1801 1788->1754 1812 6e80a55-6e80a5f 1788->1812 1789->1788 1798 6e808a3-6e808c1 1790->1798 1791->1790 1793->1754 1831 6e80a9b-6e80aa5 1793->1831 1794->1793 1808 6e80968-6e8096b 1795->1808 1809 6e80940-6e80943 1795->1809 1796->1795 1872 6e808c3-6e808c6 1798->1872 1804 6e80aed-6e80aef 1800->1804 1805 6e80b2e-6e80b31 1800->1805 1810 6e80ad1-6e80ae3 1801->1810 1811 6e80ab3-6e80ac9 1801->1811 1813 6e80b0f-6e80b19 1804->1813 1814 6e80af1-6e80b07 1804->1814 1817 6e80b6c-6e80b6f 1805->1817 1818 6e80b33-6e80b35 1805->1818 1833 6e80972-6e8098c 1808->1833 1820 6e80946 1809->1820 1810->1754 1811->1810 1812->1754 1813->1754 1849 6e80b1f-6e80b29 1813->1849 1814->1813 1824 6e80baa-6e80bad 1817->1824 1825 6e80b71-6e80b73 1817->1825 1829 6e80b55-6e80b67 1818->1829 1830 6e80b37-6e80b4d 1818->1830 1843 6e8094e-6e80964 1820->1843 1838 6e80baf-6e80bb1 1824->1838 1839 6e80be7-6e80bea 1824->1839 1834 6e80b93-6e80ba5 1825->1834 1835 6e80b75-6e80b8b 1825->1835 1829->1754 1830->1829 1831->1754 1856 6e8098e-6e809ad 1833->1856 1857 6e809af-6e809b5 1833->1857 1834->1754 1835->1834 1847 6e80bd1-6e80be5 1838->1847 1848 6e80bb3-6e80bc9 1838->1848 1852 6e80c28-6e80c2a 1839->1852 1853 6e80bec-6e80bee 1839->1853 1843->1820 1888 6e80966 1843->1888 1847->1754 1848->1847 1849->1754 1859 6e80c4a 1852->1859 1860 6e80c2c-6e80c42 1852->1860 1865 6e80c0e-6e80c18 1853->1865 1866 6e80bf0-6e80c06 1853->1866 1856->1833 1876 6e809bd-6e809c0 1857->1876 1859->1754 1860->1859 1865->1754 1883 6e80c1a-6e80c26 1865->1883 1866->1865 1880 6e808c8-6e808ca 1872->1880 1881 6e808cc 1872->1881 1884 6e809c2-6e809c4 1876->1884 1885 6e809c6 1876->1885 1889 6e808ce-6e808d0 1880->1889 1881->1889 1883->1754 1893 6e809c8-6e809ca 1884->1893 1885->1893 1888->1876 1889->1754 1890 6e808d6-6e808de 1889->1890 1890->1754 1893->1754 1896 6e809d0-6e809d8 1893->1896 1896->1754
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898625887.0000000006E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e80000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4']q$4']q
                                                        • API String ID: 0-3120983240
                                                        • Opcode ID: e41adf7ee97ac68e4d11cfb99e2cc85e2e909d24c9b624bc62746b37e5061960
                                                        • Instruction ID: de84232ed7fd85722bcf7708d9e51f3929c89e64254c7e4ad2bf1464344a1ba8
                                                        • Opcode Fuzzy Hash: e41adf7ee97ac68e4d11cfb99e2cc85e2e909d24c9b624bc62746b37e5061960
                                                        • Instruction Fuzzy Hash: 71C18C34B203148F9F9A6B64905A17EBEB7BFC5608714542DE80FD7391DF36888AC752
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (aq$(aq
                                                        • API String ID: 0-3916115647
                                                        • Opcode ID: 37692956f782d2e1e7aa516df5a8052c2c74b0b2625d4cdc82dfe41fc54c1ad8
                                                        • Instruction ID: a1a44e894974a4e98c57247d7dbd1a25fc5d6c746613ed4bc1bf32d7bd1ad165
                                                        • Opcode Fuzzy Hash: 37692956f782d2e1e7aa516df5a8052c2c74b0b2625d4cdc82dfe41fc54c1ad8
                                                        • Instruction Fuzzy Hash: 5971EF307016558FC764DF28C894A6EBBE2FFC9310B55896DE54ACB781EE34E802CB91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898640961.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e90000_csc.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 46dc47ac8a9871ef009978296cd0cc1512c47a3606884587802d8542f045d187
                                                        • Instruction ID: 8e6c0e526713618590593a9c8cc77c3f9c2cc52d5d9c980c03dd1bbb3395e380
                                                        • Opcode Fuzzy Hash: 46dc47ac8a9871ef009978296cd0cc1512c47a3606884587802d8542f045d187
                                                        • Instruction Fuzzy Hash: C5519C30A01304CFEF84CF25D6547E973B3EF88315F24A46AD006EB295EB349981CB68
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898640961.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e90000_csc.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 5a29af3eb25a091f5d5d789ca6e0b0b1b194fc25fab4a8378bb071a327dfb13f
                                                        • Instruction ID: e6e0385da3c26b42e6024221f6db1b9592903de7ccd7eb4c44ccb7c589d4324e
                                                        • Opcode Fuzzy Hash: 5a29af3eb25a091f5d5d789ca6e0b0b1b194fc25fab4a8378bb071a327dfb13f
                                                        • Instruction Fuzzy Hash: 4D418B30A01305CFEF94CF25D6597A977B3EF88319F24E469D001DB2A5EB388985CB68
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(?,?,?,?), ref: 055AC8CC
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898404037.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55a0000_csc.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 6086c87247c4201dd1fc54c5c9ba8c327b3541401573ff69e5ee9efac56c0ad0
                                                        • Instruction ID: 3808a76910716e1280af9be3913f0cf785bda96db2dbdf2fa54c40fe64e71110
                                                        • Opcode Fuzzy Hash: 6086c87247c4201dd1fc54c5c9ba8c327b3541401573ff69e5ee9efac56c0ad0
                                                        • Instruction Fuzzy Hash: E511EAB5D002499FDB10DFAAC484AEEFBF5FF48310F148429E519A7250C7799945CFA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vkm
                                                        • API String ID: 0-2107937421
                                                        • Opcode ID: 321004bd78e13655c9dea0e22aa271423b29f8f251ad1e1a6b65a3dd0ffefc3d
                                                        • Instruction ID: 57a503faf003b0ba83a4e12cb9c81c513d1d49bac1324e2f382ead59cb9e50a9
                                                        • Opcode Fuzzy Hash: 321004bd78e13655c9dea0e22aa271423b29f8f251ad1e1a6b65a3dd0ffefc3d
                                                        • Instruction Fuzzy Hash: 64914B70E002099FDF50CFA9C99979DBBF1AF88314F14812DE429E7394D7749846CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: a]q
                                                        • API String ID: 0-3765744518
                                                        • Opcode ID: 2d21b5c1fddaa3894f01ac07ce792c7067ad2c9744c32260dd11d31d1da88748
                                                        • Instruction ID: bb39d41248e44f7034927553174a7f96e5f61c3234d567c3377ddd177eb62c8b
                                                        • Opcode Fuzzy Hash: 2d21b5c1fddaa3894f01ac07ce792c7067ad2c9744c32260dd11d31d1da88748
                                                        • Instruction Fuzzy Hash: 62618D30A0020CCBDB44DAA5E9647ADBBB2EBC5304F11A22CE4029B7D5CBB49D45CB95
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898625887.0000000006E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e80000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4']q
                                                        • API String ID: 0-1259897404
                                                        • Opcode ID: baa5d2e1d4ff5adffaebf8292c2cd7422236690a136d47444c0379b943caaf6d
                                                        • Instruction ID: 9ee581b856a78f73e581a038dcde25005a72fdf1b08a54ff19cfb223e8311525
                                                        • Opcode Fuzzy Hash: baa5d2e1d4ff5adffaebf8292c2cd7422236690a136d47444c0379b943caaf6d
                                                        • Instruction Fuzzy Hash: 61014E31B193518FD7A73A3558296663F76EFC2160724047BE44ED7241EA264C4DC7D2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898404037.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55a0000_csc.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: 9a6fb3b24360f8680fee67fbf1fbd90239dc8ab157bccec7ac4eeab139b15c7a
                                                        • Instruction ID: 9d770a61877b0a4c0723a761468979a346439bd3d03128f9cc75b961100812d6
                                                        • Opcode Fuzzy Hash: 9a6fb3b24360f8680fee67fbf1fbd90239dc8ab157bccec7ac4eeab139b15c7a
                                                        • Instruction Fuzzy Hash: 171125B1D002498BCB20DFAAC4457AEFBF5FF88724F208419D51AA7240CB79A944CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cbeb7c28d5feb24e20afdcf91445a838ad4d32f075fdb0efdbb9f0b5860b578e
                                                        • Instruction ID: b01e459f5aee12c79b3ed82035efb673a85f4bd4be25f774403d0e394b4f7d54
                                                        • Opcode Fuzzy Hash: cbeb7c28d5feb24e20afdcf91445a838ad4d32f075fdb0efdbb9f0b5860b578e
                                                        • Instruction Fuzzy Hash: 0DA15B70E00209CFDB50CFA8D99579DBBF1AF88354F14812DE429E7394EB749895CB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898625887.0000000006E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E80000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e80000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8b32078887a54871d6a5460d81ecf7aa96ee445f1349d111af7a1f2f1f408ca
                                                        • Instruction ID: 8db97cba2f1aaf78ae854ba3625a32a7b896c1d2ca9c7cca6d834f9dcfeb2e0e
                                                        • Opcode Fuzzy Hash: a8b32078887a54871d6a5460d81ecf7aa96ee445f1349d111af7a1f2f1f408ca
                                                        • Instruction Fuzzy Hash: 7D5153207003468FD7156AAEC49C76BA6FFAFE4605F54803D630AC72D8DFA58C09C795
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce0b78f5e827acd103c2636a0b58b0430c24ba9ec93084681b02934b164ed842
                                                        • Instruction ID: 782f5cb908c669eb2b066f9860df3e3f183fa30eb55d0a82f2698c933cc1e18f
                                                        • Opcode Fuzzy Hash: ce0b78f5e827acd103c2636a0b58b0430c24ba9ec93084681b02934b164ed842
                                                        • Instruction Fuzzy Hash: C5614E30504209CFE760CF56D9A5BAD7BB2FB85314F24806DE001EB396D778A986CF21
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3f5137fd1c4c19a9a68d4567e885c81d3bad1f162d9dfcf2416810b3d8bda7fd
                                                        • Instruction ID: ea5e631dd5fd7d1d41e5e853b893cc6b6f372524f87d12bf57dbec0a3716f8e2
                                                        • Opcode Fuzzy Hash: 3f5137fd1c4c19a9a68d4567e885c81d3bad1f162d9dfcf2416810b3d8bda7fd
                                                        • Instruction Fuzzy Hash: CE513C30500509CFEB60CF52DAA5B6DBBB2FB84314F64806DE005EB796D778A985CF25
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5ebf1abf4ddab3fec1a926ae3c848c3c2f5c8a4fb52a7a66393013ca73accd3a
                                                        • Instruction ID: 2c88e48e07cff348519bad2877cee958e427d868f2115b916c17c8fe14450fa1
                                                        • Opcode Fuzzy Hash: 5ebf1abf4ddab3fec1a926ae3c848c3c2f5c8a4fb52a7a66393013ca73accd3a
                                                        • Instruction Fuzzy Hash: 73410730A01106CFE794CF15CD69BAA73A2FBD4344F18C0A9E51ACB7D6D738AA45CB45
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a71d4f4a4073a3fc1f4541a25661cb31f3804fd52eb0db92bacdafef73ad5256
                                                        • Instruction ID: 3c4c784e3dd7e410fecd509d4cc06ffe405b1dce3ccdb215e5d352a4e7adcd8c
                                                        • Opcode Fuzzy Hash: a71d4f4a4073a3fc1f4541a25661cb31f3804fd52eb0db92bacdafef73ad5256
                                                        • Instruction Fuzzy Hash: 2441BF32A00204CFE754CF65DD99B59BBA2FBC8340F64816DE1099B3D5CB79A845CF50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ddf4fff5185577fa5fd3868f4b17246e2b22ea7c0f882004c84d449e2bcb2203
                                                        • Instruction ID: fbda44518d0a299dbf6a2ff4d2c54701f3139de8981a8e3e35963c3a54933f88
                                                        • Opcode Fuzzy Hash: ddf4fff5185577fa5fd3868f4b17246e2b22ea7c0f882004c84d449e2bcb2203
                                                        • Instruction Fuzzy Hash: 8F41CD31A01204CFE750CF65C999BAABBA2FBC8310F64826CE1099B3D5CB79A841CF54
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ecb56d173a4b4d18801d47cfb921daa3ce7ecd966bfb520a9a748c5f25edc392
                                                        • Instruction ID: ee2fcb2fd577f398f027cae46fe8330f1e8d88650d4ef5a03606f053565fe1e8
                                                        • Opcode Fuzzy Hash: ecb56d173a4b4d18801d47cfb921daa3ce7ecd966bfb520a9a748c5f25edc392
                                                        • Instruction Fuzzy Hash: 38417A30645115CFEB94CB24DE697A933B3EBD4304F14806DD216DB7B2EB789989CB09
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e9844fea988c9b2104e8fcbbe5b42d24c5f626ad70f05bbd0fd2d3ff548f854
                                                        • Instruction ID: 95755e6a096dae6dc85e332bed1cfdd9884b3759c879f0af3b583a89d86921de
                                                        • Opcode Fuzzy Hash: 2e9844fea988c9b2104e8fcbbe5b42d24c5f626ad70f05bbd0fd2d3ff548f854
                                                        • Instruction Fuzzy Hash: 9D4113B1D00308DFCB10DFA9C890ADEBFB5FF88314F108129E419AB250DB759945CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 597b3d8bea7169749afea0b59edbf0c4c8a475413164db29f457938552df9312
                                                        • Instruction ID: d888b8615ee2a126ddea44383bfccc1b952794daedcdea3f961f34bf43cf35ac
                                                        • Opcode Fuzzy Hash: 597b3d8bea7169749afea0b59edbf0c4c8a475413164db29f457938552df9312
                                                        • Instruction Fuzzy Hash: 8131F73070020CCBE7449AA5D57879EBBA3EBC1700F12622DF402DBBC5CBB49D468BA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1fc737cbd6b260d18434d4bbe6f32739e9d3b578e2faca832c7576a090d80fcb
                                                        • Instruction ID: 6946fcf82792ee245ab48842602aa4c483b956a08a76da42d1b379674e4f9dfb
                                                        • Opcode Fuzzy Hash: 1fc737cbd6b260d18434d4bbe6f32739e9d3b578e2faca832c7576a090d80fcb
                                                        • Instruction Fuzzy Hash: 46412B30A01106CFD794CF29CD69BAAB7A6BBC4344F08C0ADE519CB7D5E738AA45CA44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 427980a5ceadea529ca6ba3582dca466f6d29eb0d81dc6618c293fca4b4f294c
                                                        • Instruction ID: 1595f691ad036a4cb1c41f679404acd63a4dfd39a2e3892433e0f8fbdee93225
                                                        • Opcode Fuzzy Hash: 427980a5ceadea529ca6ba3582dca466f6d29eb0d81dc6618c293fca4b4f294c
                                                        • Instruction Fuzzy Hash: 4541EEB0D003499FDB10DF99C994ADEBFB5FF88314F248029E419AB254DB75A985CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c46f812a2f3388454f57c742a06ca26a4ff4d3a1c2f6b98b4a3c4717c3bfb7e8
                                                        • Instruction ID: 251882a53580a6896e2e654efc25f64a2fcd745fbf27d34520ac0145698753a1
                                                        • Opcode Fuzzy Hash: c46f812a2f3388454f57c742a06ca26a4ff4d3a1c2f6b98b4a3c4717c3bfb7e8
                                                        • Instruction Fuzzy Hash: 16312830701106CBE794CE15DD69BA6B3A6BBD0344F08C0ADE41ACB7D6E738BA45CA44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6f5d86007a01aaba2d2770ddfe2d7f4725b7cf6eb258aa2faeaae935851a5da1
                                                        • Instruction ID: e803ea4c045ece4ac6fd04d5491f7ff9fa4f03c74fc02f3f68b4b387e2f5dc89
                                                        • Opcode Fuzzy Hash: 6f5d86007a01aaba2d2770ddfe2d7f4725b7cf6eb258aa2faeaae935851a5da1
                                                        • Instruction Fuzzy Hash: D731723070020CCBD7849AA5D5787ADBBA3ABC5304F11A62CE406CBBC5DBB99D45CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 74e380c3de1e07d7806be02cb71358294b50dd391d334403820cb81c2d4763a7
                                                        • Instruction ID: 8d814f3ebddca26abe67fdf3898e5dc596b089ee6bb7e08054e258f2ced9f3d0
                                                        • Opcode Fuzzy Hash: 74e380c3de1e07d7806be02cb71358294b50dd391d334403820cb81c2d4763a7
                                                        • Instruction Fuzzy Hash: AB31A13070020CCBD784CA95D6747ADB7A3ABC5304F52A66CE406CBBC5CBB89D458FA9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a17bdcb06d8e571e07ce18d7c78a879a75158399997a76548c312a3f4f585773
                                                        • Instruction ID: e03f6643a4ca7e102d04b6f2ccfa643777cfedb64601a51dc1cd8f615c851bbd
                                                        • Opcode Fuzzy Hash: a17bdcb06d8e571e07ce18d7c78a879a75158399997a76548c312a3f4f585773
                                                        • Instruction Fuzzy Hash: 2331933070020CCBD7448A95D5747ADB7E3ABC5304F22A56CF4068BBC5CBB99D458F65
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 467d97e5981cb064612666125abbbba6fb843f3e762673b75722cac8d4c79ff1
                                                        • Instruction ID: 56f3db8a1dab64acdf7e7c64bf4e9a28106180c39b4d149320e5c68724f214c7
                                                        • Opcode Fuzzy Hash: 467d97e5981cb064612666125abbbba6fb843f3e762673b75722cac8d4c79ff1
                                                        • Instruction Fuzzy Hash: BF31933070020CCBD7449AA5D5787ADBBA3ABC5304F11A62CE406CBBC5CBB99D45CB55
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a84d65836dd2291c35575351f09466ff0bd08b53fc068a12a88efb0930aa9a7
                                                        • Instruction ID: 1755c73b4cca93d25fd2924aa75783d9e2a9bdeaec1a017de3359f90dd748dcf
                                                        • Opcode Fuzzy Hash: 7a84d65836dd2291c35575351f09466ff0bd08b53fc068a12a88efb0930aa9a7
                                                        • Instruction Fuzzy Hash: C631A23070020CCBE7548AA5D5787ADB7E3ABC5304F22A61CF4168BBC5CBB89D418F55
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 697cc92a5b0a9d2d050e6e030fb4092ee274e57bb9308fe290c5af835373cc89
                                                        • Instruction ID: 4e37d7a2d0ae7dc66eb2bf595c39140b6a0221774b4642929678012c240b1925
                                                        • Opcode Fuzzy Hash: 697cc92a5b0a9d2d050e6e030fb4092ee274e57bb9308fe290c5af835373cc89
                                                        • Instruction Fuzzy Hash: 5221963070020CCBE7489A95D5747ADB7E3ABC5304F11A66CE406CBBC5CBB89D458BA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8187f865ae99f9871cffadf974b2da487e1215eb683da8a397c17664fb20e91b
                                                        • Instruction ID: 5cecfba5a069d124d267ccbd37c13dd36af06ce35ce9ed5dc36002470f777ecd
                                                        • Opcode Fuzzy Hash: 8187f865ae99f9871cffadf974b2da487e1215eb683da8a397c17664fb20e91b
                                                        • Instruction Fuzzy Hash: 9521B63070020CCBE7449A95D5747ADB7A3ABC1304F52A62CF406CBBC5DBB89D458FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bd0cf3ad8fb4bff388bbe39b2be9c842ee81ebf809612f9683dc6a7e2cd17695
                                                        • Instruction ID: cb5dd91db457f052ae36db149313ca2d63ac5c5a08018fe3b90aa2ce24f82b53
                                                        • Opcode Fuzzy Hash: bd0cf3ad8fb4bff388bbe39b2be9c842ee81ebf809612f9683dc6a7e2cd17695
                                                        • Instruction Fuzzy Hash: 3E21613070020CCBE7449A95D5747ADB7A3ABC5304F16A66CE4068BBC5CBB89D458BA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a18062fed6cf5a963f81dfe482cf851d7d8f93de72b779895da95737d19a048
                                                        • Instruction ID: 8a8a2a2f814ba18b338aa5024047e89be90f2e4683a8306e8b837769600829e5
                                                        • Opcode Fuzzy Hash: 7a18062fed6cf5a963f81dfe482cf851d7d8f93de72b779895da95737d19a048
                                                        • Instruction Fuzzy Hash: 9F21C93070020CCBD7849A95D57476EB7A3ABC5704F12A61CF406CBBC5CBB89D428FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 213c3603a864f9893ccbc0863769af4b457c9fed90ca43d1551f5d17322d7122
                                                        • Instruction ID: 7f48ed44739f9d6cb99cff86c3d57dedd8570163e66063759e23524a70f0fcd9
                                                        • Opcode Fuzzy Hash: 213c3603a864f9893ccbc0863769af4b457c9fed90ca43d1551f5d17322d7122
                                                        • Instruction Fuzzy Hash: 9021943070020CCBE7549A95D5747ADB7E3ABC5304F12A61CE406CBBC5CBB89D458FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8120f38027fef1b55d492e745a2c7d7b1e04d19cb87e815104869c56ea416a57
                                                        • Instruction ID: 09f650350d1f2126f50e6e9a6e4a57e796bd8942c9c2894f9d8e2b3576b003b2
                                                        • Opcode Fuzzy Hash: 8120f38027fef1b55d492e745a2c7d7b1e04d19cb87e815104869c56ea416a57
                                                        • Instruction Fuzzy Hash: DC21743070020CCBE7949A95D5787ADB7A3ABC5304F52A61CE406CBBC5CBB89D45CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39f6126e10b2be91a7af0a17cae67fe9351566f42e4f79c69c21a9ad6fe00cc4
                                                        • Instruction ID: 7d3c8dae0bd86493ad61fb0e78bc36ed83a1c6f63bed01f528291e473a3b87e7
                                                        • Opcode Fuzzy Hash: 39f6126e10b2be91a7af0a17cae67fe9351566f42e4f79c69c21a9ad6fe00cc4
                                                        • Instruction Fuzzy Hash: C121863070020CCBE7849AA6D5747ADB7E3ABC5304F22A61CE406CBBC5DBB85D458F69
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d24435abe76e01dae2e6343ee2d2337f5b20e80e36e889f93d2b07d2140aba4
                                                        • Instruction ID: 359afb82d8cfe34503842baaf0675c318b2fe47b4ee27360808eaccbed13b495
                                                        • Opcode Fuzzy Hash: 3d24435abe76e01dae2e6343ee2d2337f5b20e80e36e889f93d2b07d2140aba4
                                                        • Instruction Fuzzy Hash: 6F21B83070420CCBE7549A95D5747ADB7A3ABC5304F12A61CF406CBBC5CBB89D468FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3e22fa8a9ed58ec50e6ce877ed422fba7b626d888125a838fed5df13c3280a31
                                                        • Instruction ID: 8b4e2a589e080ca908e5dff1ee62967ff258c6c50a9f5f42f71466879e9761e3
                                                        • Opcode Fuzzy Hash: 3e22fa8a9ed58ec50e6ce877ed422fba7b626d888125a838fed5df13c3280a31
                                                        • Instruction Fuzzy Hash: 0321863070420CCBE7949AA5D5747ADB7E3ABC5304F12A61CE406CBBC5CBB89D468FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 10feb5b512e2cc9ed14baaae48c60e82ef8b20737324d6739467684fa7857d2a
                                                        • Instruction ID: ef5b657dac67172968186b2651010c438df0ca44d32a4eb4ad12edcdb69f4005
                                                        • Opcode Fuzzy Hash: 10feb5b512e2cc9ed14baaae48c60e82ef8b20737324d6739467684fa7857d2a
                                                        • Instruction Fuzzy Hash: 9621983070020CCBD7449A95D5747ADB7E3ABC5304F22A62CE506CBBC5CBB45D458FA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4d333cac698f8c69827227769a2f95f5feb4e0c9eab6277364c30178e980d51a
                                                        • Instruction ID: c7aad9de17106fa3e3b0a2b2e16adca80fdba0284d8fabb920295b0bddc5cf08
                                                        • Opcode Fuzzy Hash: 4d333cac698f8c69827227769a2f95f5feb4e0c9eab6277364c30178e980d51a
                                                        • Instruction Fuzzy Hash: 1321983070020CCBD7449AA5D5747ADB7E3ABC5304F21A61CE406CBBC5CBB49D468BA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b90e8411d0f31a241fe926328acce18ad194b1a631a0e1203e1ee137f149825
                                                        • Instruction ID: 63e7fa2d6024cec58cdd83722ceb6046e9af8a9a0d6940641ea3f7c5fffbc788
                                                        • Opcode Fuzzy Hash: 0b90e8411d0f31a241fe926328acce18ad194b1a631a0e1203e1ee137f149825
                                                        • Instruction Fuzzy Hash: D1014970B063218FCB163B70841935E3BE6AF8562071408BFD44ACB291EE3AC843C792
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 92d271c10ab1dba15e5e50d22f0eacf445ced6a794dbb27868c776f893ee1127
                                                        • Instruction ID: 2822180e988795ab3eda332a5c718a261dbc54fe3a9d7b1064c571a926955360
                                                        • Opcode Fuzzy Hash: 92d271c10ab1dba15e5e50d22f0eacf445ced6a794dbb27868c776f893ee1127
                                                        • Instruction Fuzzy Hash: 81018B31A01208DBDB189B68D8295AE7FF3EBC8711F11842EE802E7390DFB14D058B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 534ce5c0e8fdbe9d58edfeb9cfa256a665c52cdff53aa4286029c35be6f9437e
                                                        • Instruction ID: 63d275f05b323ce4b26951bfa43f486684747cf05e5b643f41e30d1d85d5dbc5
                                                        • Opcode Fuzzy Hash: 534ce5c0e8fdbe9d58edfeb9cfa256a665c52cdff53aa4286029c35be6f9437e
                                                        • Instruction Fuzzy Hash: CDF04F31B063615FDB263775481822E7AD6AFC5A25B14087ED54ACB391EE3EC84387C6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f59717c1789a04c31c1d8e3571e2418a03945c26f0f677f971986858e7a6c0f
                                                        • Instruction ID: d1ab261d1f7f09a28da2b8bc49331addc4a1e199d1cdf330f35479468d8e4d40
                                                        • Opcode Fuzzy Hash: 2f59717c1789a04c31c1d8e3571e2418a03945c26f0f677f971986858e7a6c0f
                                                        • Instruction Fuzzy Hash: 4D019E31600208EBDB149F65C8296AE7FF7EB8C710F11402DE502A7380DF715D04CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c7132a4a1aa5c378e31dcae936eb0a31d07dae1a658dc520b2007fc6e6e167dd
                                                        • Instruction ID: 7cc452c49e3943fc590727118c5b8178bf644c487b07d07055d132699a1cb002
                                                        • Opcode Fuzzy Hash: c7132a4a1aa5c378e31dcae936eb0a31d07dae1a658dc520b2007fc6e6e167dd
                                                        • Instruction Fuzzy Hash: 7EF08177E063105FD790CF759408A9EBB66EB84715B42C477D40EDF206DD308441AF84
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f56bd65e633ed2e28e83a9496b8a74fb0a13d1c17a7d12cab3e2a2494a39a1cf
                                                        • Instruction ID: 2498160afc7e6c05634eb36a70343409f4ef469386387336e8ffb06bb8f3af30
                                                        • Opcode Fuzzy Hash: f56bd65e633ed2e28e83a9496b8a74fb0a13d1c17a7d12cab3e2a2494a39a1cf
                                                        • Instruction Fuzzy Hash: A201D630A00218DBDB649A29C85579A77E6EBC0300F20853EE50297795DB359D468FA6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b08db6334a58165deefa64822308bffce15b748255951f71f1c827c5e32fd7d9
                                                        • Instruction ID: ea45b08f5c7696102099b486790ffc56bba8879dafc93d5a541ecf88e204babf
                                                        • Opcode Fuzzy Hash: b08db6334a58165deefa64822308bffce15b748255951f71f1c827c5e32fd7d9
                                                        • Instruction Fuzzy Hash: 29F0F631B001189FCB44EEB8E819ADE77E1EFC8304F410079D101EB3A1EB7998158BD2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61f701e21422c070730e3d3626540b66785dad7bdbe47519322a2130b71a123b
                                                        • Instruction ID: 89cbbe11e55ca111d993c2c345a162f6bcb1ef496604f895c446c8df21fc4f89
                                                        • Opcode Fuzzy Hash: 61f701e21422c070730e3d3626540b66785dad7bdbe47519322a2130b71a123b
                                                        • Instruction Fuzzy Hash: 89F0E232E052209BE790CF669408A9EBBAAEB88615B42C476E80DDB105EE3088419FC1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a81a828cb3f88ff687881e41c87641c4e3dffd266624ec85c7322cc52b907e78
                                                        • Instruction ID: 183b917ea6bbb8fafe04e5bc75a84f128045b46c22b48ffe572832c3756819f4
                                                        • Opcode Fuzzy Hash: a81a828cb3f88ff687881e41c87641c4e3dffd266624ec85c7322cc52b907e78
                                                        • Instruction Fuzzy Hash: EBF0B430E00208DFCB44AB78D82A66E73B0EB84305F41487DD516DB3E1FB389405CB86
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e26900f5682071cab6a2eb35b16158b1a257fc9fed90b30f1cae87a898f0f126
                                                        • Instruction ID: 6bf7b19fed4f71fdff3aebc921c422d8622fd3f25187b564e0186db8656e37cb
                                                        • Opcode Fuzzy Hash: e26900f5682071cab6a2eb35b16158b1a257fc9fed90b30f1cae87a898f0f126
                                                        • Instruction Fuzzy Hash: E3F08231B001189FCB40EEB8E919ADE77E5EFC9701F410078D205EB3A5DB79A9158B96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b291fcd917096d94327b0ababa1c401c50bfcbe4b20759a1bb8a0812df59b1f
                                                        • Instruction ID: 18724e7c1ab2747b2049ec0992ed00b2dca66c070278621f34f494dc2c379dac
                                                        • Opcode Fuzzy Hash: 5b291fcd917096d94327b0ababa1c401c50bfcbe4b20759a1bb8a0812df59b1f
                                                        • Instruction Fuzzy Hash: 0EF03034E04209DFCB44AB78D92526E73B5ABC4319F40487CD606DB3D1FB3D95068B96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 92411ceb897f5675ba11bd49185722e9c26584e6878cae1eeaac6d4fbb32272d
                                                        • Instruction ID: 5c37fe13fddc6ebdb51ea063112de7eedcc77fe70aa0c15608edc2735c59a8c9
                                                        • Opcode Fuzzy Hash: 92411ceb897f5675ba11bd49185722e9c26584e6878cae1eeaac6d4fbb32272d
                                                        • Instruction Fuzzy Hash: E4F0ED33A0008ADFEB84CEA4DA166FA73E1EBC8303F00482AD516D7240E3BC15078F02
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fae835d5725200566ac487eb031a7dd07cf903b325c265b149fc92243f57ed8e
                                                        • Instruction ID: 60bbb9487ac5031b06d2f3380ef20497956bf9a815ab60346ee5f376811c6a31
                                                        • Opcode Fuzzy Hash: fae835d5725200566ac487eb031a7dd07cf903b325c265b149fc92243f57ed8e
                                                        • Instruction Fuzzy Hash: 7FE092312012945FC71AAB79D959A9A7FA9EFC1210B0144BAD018CB2A1EF698D06C7E5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1de3e7ef3bff3986bd59b61d0e2d308b6f86e075e8b68cc5d3a2573c8999c29b
                                                        • Instruction ID: be811a6a5b775d5f14a44ebfe54b6c436ac6e30d36d27e805a821df1a3962308
                                                        • Opcode Fuzzy Hash: 1de3e7ef3bff3986bd59b61d0e2d308b6f86e075e8b68cc5d3a2573c8999c29b
                                                        • Instruction Fuzzy Hash: F0F0DAB5A41254CFC790CF28C859A887BF1FF4A314F1540D9D64A9B321EB309D42CF41
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 135b6ac59687ff5d9b739ffa1c2c1160a49d11318965aefc4ae1bfb51072e954
                                                        • Instruction ID: 93c8febb660edde7aea29651929132a8551d416d6b53d144b41a64cafe782ec8
                                                        • Opcode Fuzzy Hash: 135b6ac59687ff5d9b739ffa1c2c1160a49d11318965aefc4ae1bfb51072e954
                                                        • Instruction Fuzzy Hash: DBF0D475A052148FCB51CF28C994A887BF1FF49309F0601D5D649AB321D774AD85CF40
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 119ae9e466d2b1252fb3a3bbcc66b6ef5e21acad760e55fbc93eadba2ebf108b
                                                        • Instruction ID: 4c0ce57aa4c6c9ec6485a11a5f1a74b485182b97f5accc9efce750316190042b
                                                        • Opcode Fuzzy Hash: 119ae9e466d2b1252fb3a3bbcc66b6ef5e21acad760e55fbc93eadba2ebf108b
                                                        • Instruction Fuzzy Hash: E8E0D834A01014CFF780CA17EE517A87763FBD4315F149079F50682695C7385645DE18
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 67feacc8bbfe58b7a98f93d402e4e8cab5165fda1e17330226f5d20bf7b20cef
                                                        • Instruction ID: 4dbdd84a8128d6ec7058ba690bb1570ea700aef8fe6b0fc0e6a2c9eb47de3af3
                                                        • Opcode Fuzzy Hash: 67feacc8bbfe58b7a98f93d402e4e8cab5165fda1e17330226f5d20bf7b20cef
                                                        • Instruction Fuzzy Hash: 17D0C2322002544BC71A6B6DEA08B9A37AEEFC0210B00003AE1288B350CF69DD05C7E5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b8b96c5fec4bb0442c796e6d80e3b857a13fcc9f598ed5e528a6bd185b9e3457
                                                        • Instruction ID: 21d91d0345bcb5746049721de4d1d07649ce1767dfe48198fd7db0913b58de2f
                                                        • Opcode Fuzzy Hash: b8b96c5fec4bb0442c796e6d80e3b857a13fcc9f598ed5e528a6bd185b9e3457
                                                        • Instruction Fuzzy Hash: DAD012355457528FD70A5614A4126D63F32E797631705819BE001CB1A6CFA40C97CB54
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a659bead27975fbb4cc572a8081562e0a6e3b7fc709039b6ae05d3565b4fde04
                                                        • Instruction ID: e7419ea07bff5870683ca2a6bc3834c303749ff8a63303e0882555fa2f18bf85
                                                        • Opcode Fuzzy Hash: a659bead27975fbb4cc572a8081562e0a6e3b7fc709039b6ae05d3565b4fde04
                                                        • Instruction Fuzzy Hash: 66E08631E0010DCFDB00DE59C9187EB77B4DB84301F004475D51497341D7B86516CB46
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5cce94552e64198e5ba3eec9e3c2f80f3625a48543e8f269656d10b391bda95f
                                                        • Instruction ID: aac5898e4b51d46dfff1d0a14e7dece2a45f8f81aa97da430e02abe35e690b4a
                                                        • Opcode Fuzzy Hash: 5cce94552e64198e5ba3eec9e3c2f80f3625a48543e8f269656d10b391bda95f
                                                        • Instruction Fuzzy Hash: 32E04F30A14311DFEB454F94C98C6983BB0AB45706B461469EA02DF204CF30D846BF55
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c1bcaa85fe0d957a4fd17f93189637df689499a1ac7553cf333ddc0cc160520b
                                                        • Instruction ID: c33073455df5bb02c3df38cf16263b1241bdb46ddf068f6924e9f5197f3103ce
                                                        • Opcode Fuzzy Hash: c1bcaa85fe0d957a4fd17f93189637df689499a1ac7553cf333ddc0cc160520b
                                                        • Instruction Fuzzy Hash: 45E01A306001218FDA84DF28D9A5BE933E5AF48304F0911AE9016DB392CB285A04CB9C
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3899226256.0000000009800000.00000040.00000800.00020000.00000000.sdmp, Offset: 09800000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_9800000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a6acc56352be8200f86ea79fd87901f5712a697cd9f5dcf61abb1f44bb42b2be
                                                        • Instruction ID: b4d07bc8930b4743f2ad50b87f6dadbfecd98e7b3985ab53461b62fcc3aed8d5
                                                        • Opcode Fuzzy Hash: a6acc56352be8200f86ea79fd87901f5712a697cd9f5dcf61abb1f44bb42b2be
                                                        • Instruction Fuzzy Hash: 98D05E34506340AFC3068B10C951844BFA1EF87211714C0CAE0098B1A2C7329C43CB52
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3898521032.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_6e10000_csc.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0ceb898bca64e145bfe2f2c665f68f05e7613165e15e5ad916fae51b895cd0f0
                                                        • Instruction ID: 24c59cfbe0121cefe7368f384e4a174849568976e25adb84f9cc28484f2430cd
                                                        • Opcode Fuzzy Hash: 0ceb898bca64e145bfe2f2c665f68f05e7613165e15e5ad916fae51b895cd0f0
                                                        • Instruction Fuzzy Hash: DCB0923146810A8BF2884621940E3C5BD22BB00201F0A46B29C0A8A5218A318C899A80